Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,166,819 papers from all fields of science
Search
Sign In
Create Free Account
Broadcast encryption
Known as:
Revocation scheme
Broadcast encryption is the cryptographic problem of delivering encrypted content (e.g. TV programs or data on DVDs) over a broadcast channel in such…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
21 relations
Advanced Access Content System
Algorithm
Amos Fiat
Attribute-based encryption
Expand
Broader (2)
Copy protection
Digital rights management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts
Qianhong Wu
,
Bo Qin
,
Lei Zhang
,
J. Domingo-Ferrer
,
O. Farràs
,
Jesús A. Manjón
IEEE transactions on computers
2016
Corpus ID: 26264670
Broadcast encryption (BE) schemes allow a sender to securely broadcast to any subset of members but require a trusted party to…
Expand
Highly Cited
2013
Highly Cited
2013
Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks
Wei Liu
,
Hiroki Nishiyama
,
N. Ansari
,
Jie Yang
,
N. Kato
IEEE Transactions on Parallel and Distributed…
2013
Corpus ID: 17257610
Mobile ad hoc networks (MANETs) have attracted much attention due to their mobility and ease of deployment. However, the wireless…
Expand
2011
2011
An Efficient and Secure User Revocation Scheme in Mobile Social Networks
Xiaohui Liang
,
Xu Li
,
R. Lu
,
Xiaodong Lin
,
Xuemin Shen
Global Communications Conference
2011
Corpus ID: 31186917
Mobile social network (MSN) is a promising networking and communication platform for users having similar interests (or…
Expand
2011
2011
Coprivacy: an introduction to the theory and applications of co-operative privacy
J. Domingo-Ferrer
2011
Corpus ID: 14085612
We introduce the novel concept of coprivacy or co-operative privacy to make privacy preservation attractive. A protocol is…
Expand
2011
2011
An architecture for secure searchable cloud storage
Robert Koletka
,
A. Hutchison
Information Security for South Africa
2011
Corpus ID: 169191
Cloud Computing is a relatively new and appealing concept; however, users may not fully trust Cloud Providers with their data and…
Expand
Highly Cited
2010
Highly Cited
2010
Certificate Revocation to Cope with False Accusations in Mobile Ad Hoc Networks
Kyu-Yong Park
,
Hiroki Nishiyama
,
N. Ansari
,
N. Kato
IEEE Vehicular Technology Conference
2010
Corpus ID: 9157674
In Mobile Ad hoc NETworks (MANETs), certification systems play an important role in maintaining network security because…
Expand
2008
2008
Efficient Dynamic Broadcast Encryption and Its Extension to Authenticated Dynamic Broadcast Encryption
Masafumi Kusakawa
,
Harunaga Hiwatari
,
T. Asano
,
S. Matsuda
Cryptology and Network Security
2008
Corpus ID: 46076574
We propose two public-key broadcast encryption schemes. Our Scheme1 is a variant of the dynamic broadcast encryption scheme…
Expand
2004
2004
Reconfigurable key management for broadcast encryption
M. Mihaljević
IEEE Communications Letters
2004
Corpus ID: 314864
A novel approach for the cryptographic keys management in the broadcasting scenario with a conditional access control is proposed…
Expand
Review
2003
Review
2003
A Survey of Broadcast Encryption
J. Horwitz
2003
Corpus ID: 7554033
Broadcast encryption is the problem of a sending an encrypted message to a large user base such that the message can only be…
Expand
1999
1999
Towards Making Broadcast Encryption Practical
Michel Abdalla
,
Y. Shavitt
,
A. Wool
Financial Cryptography
1999
Corpus ID: 8988806
A process is disclosed for the catalytically-induced preparation of phosphazene polymers. Cyclic halophosphazenes are polymerized…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE