Documents Related by Co-Citation

249 Broadcast Encryption – Amos Fiat, Moni Naor - 1994
431 Secure Group Communications Using Key Graphs – Chung Kei Wong, Mohamed Gouda , Simon S. Lam - 1998
90 The LSD Broadcast Encryption Scheme – Dani Halevy, Adi Shamir - 2002
245 Key Management for Multicast: Issues and Architectures", RFC 2627 – D. Wallner, E. Harder, R. Agee - 1998
53 Efficient Trace and Revoke Schemes – Moni Naor, Benny Pinkas - 2000
33 Efficient methods for integrating traceability and broadcast encryption – E Gafni, J Staddon, Y L Yin - 1999
1123 Identity-Based Encryption from the Weil Pairing – Dan Boneh, Matthew Franklin - 2001
196 Multicast security: A taxonomy and some efficient constructions – Ran Canetti, Juan Garay, Gene Itkis, Daniele Micciancio, Moni Naor, Benny Pinkas - 1999
179 Key Establishment in Large Dynamic Groups Using One-Way Function Trees – David A. McGrew, Alan T. Sherman - 1998
43 Long-lived broadcast encryption – Juan A. Garay, Jessica Staddon, Avishai Wool - 2000
54 Combinatorial Bounds for Broadcast Encryption – Michael Luby, Jessica Staddon - 1998
184 Hierarchical ID-Based Cryptography – Craig Gentry, Alice Silverberg - 2002
138 On the security of joint signature and encryption – Jee Hea An, Yevgeniy Dodis, Tal Rabin - 2002
36 Coding Constructions for Blacklisting Problems Without Computational Assumptions – Ravi Kumar, Sridhar Rajagopalan, Amit Sahai - 1999
16 A Public-Key Traitor Tracing Scheme with Revocation Using Dynamics Shares – Wen-guey Tzeng, Zhi-jia Tzeng - 2001
33 Efficient tree-based revocation in groups of low-state devices – Michael T. Goodrich, Jonathan Z. Sun, Roberto Tamassia - 2004
146 Tracing Traitors – Benny Chor, Amos Fiat, Moni Naor, Benny Pinkas - 1994
460 A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack – Ronald Cramer, Victor Shoup - 1998
39 Public-key broadcast encryption for stateless receivers – Yevgeniy Dodis, Nelly Fazio - 2002