Sciweavers

1166 search results - page 8 / 234
» Adaptively Secure Broadcast
Sort
View
JCP
2006
94views more  JCP 2006»
13 years 9 months ago
Broadcast Encryption Using Probabilistic Key Distribution and Applications
A family of novel broadcast encryption schemes based on probabilistic key pre-distribution are proposed, that enable multiple sources to broadcast secrets, without the use of asymm...
Mahalingam Ramkumar
EUROCRYPT
2003
Springer
14 years 3 months ago
Two-Threshold Broadcast and Detectable Multi-party Computation
Classical distributed protocols like broadcast or multi-party computation provide security as long as the number of malicious players f is bounded by some given threshold t, i.e., ...
Matthias Fitzi, Martin Hirt, Thomas Holenstein, J&...
SP
2010
IEEE
206views Security Privacy» more  SP 2010»
14 years 1 months ago
Revocation Systems with Very Small Private Keys
In this work, we design a method for creating public key broadcast encryption systems. Our main technical innovation is based on a new “two equation” technique for revoking us...
Allison B. Lewko, Amit Sahai, Brent Waters
CUZA
2002
84views more  CUZA 2002»
13 years 9 months ago
Testing Theories for Broadcasting Processes
This paper presents a theory of testing for processes calculi which have broadcast as basic communication primitive. Firstly, we justify the necessity of an alternative theory to b...
Cristian Ene, Traian Muntean
ICC
2007
IEEE
14 years 4 months ago
A Novel k-Parent Flooding Tree for Secure and Reliable Broadcasting in Sensor Networks
Abstract— Securing broadcast communication over sensor networks is an important research challenge. In general, broadcast communication has two important metrics: security and re...
Avinash Srinivasan, Jie Wu