Efficient Methods for Integrating Traceability and Broadcast Encryption
Citations
1,277 citations
1,214 citations
1,132 citations
1,098 citations
667 citations
References
3,545 citations
"Efficient Methods for Integrating T..." refers background in this paper
...P, according to the access structure and the choice of secret sharing scheme (see [ 14 ] for more on access structures and secret sharing)....
[...]
[...]
1,449 citations
1,195 citations
"Efficient Methods for Integrating T..." refers background or methods in this paper
...We note that in this paper we do not consider other models such as one-time schemes [3], zero-message schemes [4], and schemes that allow rekeying [20,6]....
[...]
...In the Internet draft [20], a hierarchical tree-based scheme is recommended for use in a broadcast encryption system....
[...]
...Many solutions to this problem have been proposed using broadcast encryption schemes [3,9,10,4,5,15,13,20,11,19,16,6,1]....
[...]
[...]
711 citations
491 citations
"Efficient Methods for Integrating T..." refers background in this paper
...Theorem 4 ([8])....
[...]
...2 The following result by Erdös, Frankl, Füredi [8] is very useful in determining the relationship between the parameters of a set system satisfying the condition in the previous lemma....
[...]