[1]
S. Berkovits: How to broadcast a secret. Proceedings of Eurocrypt'91, LNCS 547, pp.536-541, (1991).
Google Scholar
[2]
A. Fiat, Moni Naor: Broadcast encryption. Proceedings of Crypto'93, LNCS 773, pp.480-491, (1993).
DOI: 10.1007/3-540-48329-2_40
Google Scholar
[3]
C. K. Wong, M. Gouda and S. Lam: Secure Group Communications Using Key Graphs, SIGCOMM (1998).
Google Scholar
[4]
D.M. Wallner, E.J. Harder and R.C. Agee: Key Management for Multiast: Issues andArchitectures, IETF draft wallner-key, (1997).
DOI: 10.17487/rfc2627
Google Scholar
[5]
D. Naor, M. Naor, J. Lotspiech: Revocation and tracing schemes for stateless receivers. Proceedings of Crypto'01, LNCS 2139, pp.41-62, (2001).
DOI: 10.1007/3-540-44647-8_3
Google Scholar
[6]
D. Halevy, A. Shamir: The LSD broadcast encryption scheme. Proceedings of Crypto'02, LNCS 2442, pp.47-60, (2002).
DOI: 10.1007/3-540-45708-9_4
Google Scholar
[7]
R. Nojima, Y. Raji, Using trapdoor permutations in a complete subtree method for broadcast encryption, IEICE vol. e88-a, pp.568-574, (2005).
DOI: 10.1093/ietfec/e88-a.2.568
Google Scholar
[8]
T. Asano: Reducing storage at receivers in SD and LSD broadcast encryption schemes. Proceedings of 4th Workshop of Information Security Applications(WISA), LNCS 2908, pp.317-332.
DOI: 10.1007/978-3-540-24591-9_24
Google Scholar
[9]
D. Naor, M. Naor: Protecting cryptographic keys: the trace and revoke approach, IEEE computer, Vol. 36, NO. 7, pp.47-53, (2003).
DOI: 10.1109/mc.2003.1212690
Google Scholar
[10]
Ignacio Gracia, Sebatia Matin, Carles Padro: Improving the trade-off between storage and communication in broadcast encryption schemes. Discrete Applied Mathematics, Vol. 143, Issue. 1-3, pp.213-220, (2004).
DOI: 10.1016/j.dam.2004.02.015
Google Scholar
[11]
Eum Sun Yoo, Nam-su Jho, Jung Hee Cheon, Myung-Hwan Kim: Efficient Broadcast Encryption using Multiple interpolation Methods. Proceedings of International conferen ce on Information security and cryptology, pp.87-103, (2004).
DOI: 10.1007/11496618_8
Google Scholar
[12]
Nam-Su Jho, Jung Hee Cheon, Myung-Hwan Kim, and Eun Sun Yoo: Broadcast Encryption Scheme ,Eurocrypt'05.
Google Scholar
[13]
Sarang Aravamuthan, Sachin Lodha: An Optimal Subset Cover for Broadcast Encryption.
Google Scholar
[14]
Y. Dodis, N. Fazio: Public key broadcast encryption secure against adaptive chosen ciphertext attack. Workshop on Public Key Cryptography PKC'03. LNCS 2567, pp.100-115, Springer-Verlag, (2003).
DOI: 10.1007/3-540-36288-6_8
Google Scholar
[15]
Yong Ho Hwang, Pil Joong Lee: efficient broadcast encryption with log-key storage.
Google Scholar
[16]
Xinjun Du, Ying Wang, Jianhua Ge, Yuming Wang: An ID-Based Broadcast Encryption scheme for key distribution. IEEE Transactions on Broadcasting, Vol. 51, NO. 2, pp.264-266.
DOI: 10.1109/tbc.2005.847600
Google Scholar
[17]
Lyuu YD, Wu ML: A fully public key traitor tracing scheme. WSEA Trans. on Circuits 1, 88−93, (2002).
Google Scholar
[18]
Dan Boneh and Brent Waters: A fully collusion resistant broadcast, trace, and revoke system. In Proceedings of ACM Computer and Communications Security, (2006).
DOI: 10.1145/1180405.1180432
Google Scholar
[19]
Miodrag J. Mihaljevic, Marc P.C. Fossorier, Hideki Imai: Time-data-memory trade-off based cryptanalysis of certain broadcast encryption schemes. IACR, Cryptology ePrint Archive, Report 2005/099, (2005).
DOI: 10.1109/lcomm.2007.071029
Google Scholar
[20]
D. Boneh, Craig Gentry, B. Waters: Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys. Appear at Crypto'05.
DOI: 10.1007/11535218_16
Google Scholar