Authenticated key distribution and secure broadcast using no conventional encryption: a unified approach based on block codes
Citations
1,376 citations
Cites background from "Authenticated key distribution and ..."
...Deng et al. [ 8 ] proposed the use of systematic linear block codes to distribute a secret to destinations....
[...]
1,027 citations
Cites background from "Authenticated key distribution and ..."
...[8] proposed the use of systematic linear block codes to distribute a secret to n destinations....
[...]
665 citations
195 citations
11 citations
Cites background from "Authenticated key distribution and ..."
...Based on the linear block code (Lin and Costello, 1983; Deng et al., 1995), Bertilsson and Ingemar (1992), and Karnin et al. (1983) independently proposed their secret sharing schemes....
[...]
...Publish (r, c1, c2, ..., cn+p−t) in an authenticated manner (Deng et al., 1995)....
[...]
References
14,980 citations
Additional excerpts
...A distinguishing feature of this type of protocols is the use of either symmetric-key cryptosystems or public-key cryptosystems [ 6 ] for authentication and key distribution....
[...]
3,848 citations
2,671 citations
1,545 citations