Broadcast encryption schemes based on RSA

被引:2
|
作者
MU, Ning-bo [1 ]
HU, Yu-pu [1 ]
OU, Hai-wen [2 ]
机构
[1] The Ministry of Education Key Laboratory of Computer Networks and Information Security, Xidian University, Xi'an, 710071, China
[2] Key Laboratory of Information Security and Secrecy, Beijing Institute of Electronic Science and Technology, Beijing, 100070, China
关键词
Compendex;
D O I
10.1016/S1005-8885(08)60181-8
中图分类号
学科分类号
摘要
Cryptography
引用
收藏
页码:69 / 75
相关论文
共 50 条
  • [31] Reducing storage at receivers in SD and LSD broadcast encryption schemes
    Asano, T
    INFORMATION SECURITY APPLICATIONS, 2003, 2908 : 317 - 332
  • [32] On broadcast encryption with random key pre-distribution schemes
    Ramkumar, M
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2005, 3803 : 304 - 316
  • [33] Recipient Revocable Broadcast Encryption Schemes Without Random Oracles
    Acharya, Kamalesh
    Dutta, Ratna
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2017, 2018, 10779 : 191 - 213
  • [34] Multi-factor Rebalanced RSA-CRT Encryption Schemes
    Ou, Huayin
    Wei, Baodian
    PROCEEDINGS OF THE 2009 2ND INTERNATIONAL CONFERENCE ON BIOMEDICAL ENGINEERING AND INFORMATICS, VOLS 1-4, 2009, : 1986 - 1990
  • [35] Pirate decoder for the broadcast encryption schemes from Crypto 2005
    Jian Weng
    ShengLi Liu
    KeFei Chen
    Science in China Series F: Information Sciences, 2007, 50 : 318 - 323
  • [36] Pirate decoder for the broadcast encryption schemes from Crypto 2005
    Weng Jian
    Liu ShengLi
    Chen Kefei
    SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2007, 50 (03): : 318 - 323
  • [37] Cryptanalysis of BGW broadcast encryption schemes for DVD content protection
    Wu, Qianhong
    Susilo, Willy
    Mu, Yi
    Qin, Bo
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 32 - +
  • [38] RSA encryption
    Feil, T
    MAPLETECH, 1996, 3 (03): : 50 - 52
  • [39] Construction of revocable broadcast encryption based on witness encryption
    Guo R.
    Chen F.-J.
    Cheng X.-G.
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2016, 45 (06): : 969 - 973
  • [40] Sequential key derivation patterns for broadcast encryption and key predistribution schemes
    Attrapadung, N
    Kobara, K
    Imai, H
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2003, 2003, 2894 : 374 - 391