In this paper, we discuss methods by which a trusted authority can broadcast a message over a network, so that each member of a specified privileged subset of users can decrypt this message to compute a secret key. In contrast with previously constructed schemes, it is possible for the different privileged users to recover different keys from the broadcast message. Moreover, this is done in such a way that no coalition is able to recover any information on any the keys they are not supposed to know. The schemes also do not require addressing, so user anonymity is maintained. The problem is studied using the tools of information theory, so the security provided is unconditional (i.e., not based on any computational assumption). Some useful s...
The problem we address is how to communicate securely with a set of users (the target set) over an i...
We describe a new method for protecting the anonymity of message receivers in an untrusted network. ...
For a multi-source multi-terminal noiseless network, the key-dissemination problem involves the task...
We consider true broadcast systems for the secure communication of session keys. These schemes provi...
We consider true broadcast systems for the secure communication of session keys. These schemes provi...
Abstract—The problem of secure broadcasting with indepen-dent secret keys is studied. The particular...
AbstractA cryptosystem which can securely broadcast secret messages in a public access distributed s...
We introduce new theoretical measures for the qualitative and quantitative assessment of encryption ...
Broadcast encryption was introduced to improve the efficiency of encryption when a message should be...
Abstract. We consider encryption keys for “pay-per-view ” broadcasting in ad-hoc systems. We assume ...
Many commercial applications of broadcast require that only those users who have paid for the servic...
Abstract—In the standard setting of broadcast encryption, information about the receivers is transmi...
[[abstract]]In this note, we show that a proposed secure broadcasting scheme is insecure. We also pr...
Broadcast encryption is an interesting application of cryptography which allows one to broadcast a s...
This paper deals with new problems which arise in the application of cryptography to computer commu-...
The problem we address is how to communicate securely with a set of users (the target set) over an i...
We describe a new method for protecting the anonymity of message receivers in an untrusted network. ...
For a multi-source multi-terminal noiseless network, the key-dissemination problem involves the task...
We consider true broadcast systems for the secure communication of session keys. These schemes provi...
We consider true broadcast systems for the secure communication of session keys. These schemes provi...
Abstract—The problem of secure broadcasting with indepen-dent secret keys is studied. The particular...
AbstractA cryptosystem which can securely broadcast secret messages in a public access distributed s...
We introduce new theoretical measures for the qualitative and quantitative assessment of encryption ...
Broadcast encryption was introduced to improve the efficiency of encryption when a message should be...
Abstract. We consider encryption keys for “pay-per-view ” broadcasting in ad-hoc systems. We assume ...
Many commercial applications of broadcast require that only those users who have paid for the servic...
Abstract—In the standard setting of broadcast encryption, information about the receivers is transmi...
[[abstract]]In this note, we show that a proposed secure broadcasting scheme is insecure. We also pr...
Broadcast encryption is an interesting application of cryptography which allows one to broadcast a s...
This paper deals with new problems which arise in the application of cryptography to computer commu-...
The problem we address is how to communicate securely with a set of users (the target set) over an i...
We describe a new method for protecting the anonymity of message receivers in an untrusted network. ...
For a multi-source multi-terminal noiseless network, the key-dissemination problem involves the task...