. Aac and . Aacs, Advanced access content system Lower bounds for subset cover based broadcast encryption Sequential key derivation patterns for broadcast encryption and key predistribution schemes How to broadcast a secret, AKI03] Nuttapong Attrapadung, Kazukuni Kobara, and Hideki ImaiBer91] Shimshon Berkovits EUROCRYPT, pp.343-356, 1991.

B. Chor, A. Fiat, and M. Naor, Tracing Traitors, Digital Rights Management [DRM]. [FN93], pp.257-270, 1994.
DOI : 10.1007/3-540-48658-5_25

A. Fiat and M. Naor, Broadcast Encryption, Lecture Notes in Computer Science, vol.773, pp.480-491, 1993.
DOI : 10.1007/3-540-48329-2_40

D. Halevy and A. Shamir, The LSD Broadcast Encryption Scheme, Lecture Notes in Computer Science, vol.2442, pp.47-60, 2002.
DOI : 10.1007/3-540-45708-9_4

N. Jho, J. Y. Hwang, J. H. Cheon, M. Kim, D. H. Lee et al., One-Way Chain Based Broadcast Encryption Schemes, Lecture Notes in Computer Science, vol.3494, pp.559-574, 2005.
DOI : 10.1007/11426639_33

M. Luby and J. Staddon, Combinatorial bounds for broadcast encryption, EUROCRYPT, pp.512-526, 1998.
DOI : 10.1007/BFb0054150

T. Martin, K. M. Martin, and P. R. Wild, Establishing the broadcast efficiency of the Subset Difference Revocation Scheme, Designs, Codes and Cryptography, vol.51, issue.3, pp.315-334, 2009.
DOI : 10.1007/s10623-008-9263-x

D. Naor, M. Naor, and J. Lotspiech, Revocation and Tracing Schemes for Stateless Receivers, Lecture Notes in Computer Science, vol.2139, pp.41-62, 2001.
DOI : 10.1007/3-540-44647-8_3

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.100.8970

M. Naor, B. Pinkaspb06, ]. E. Park, and I. F. Blake, Threshold traitor tracing On the mean number of encryptions for treebased broadcast encryption schemes, CRYPTO, volume 1462 of Lecture Notes in Computer Science, pp.502-517215, 1998.

C. Padró, I. Gracia, and M. Molleví, Improving the trade-off between storage and communication in broadcast encryption schemes, Discrete Applied Mathematics, vol.143, issue.1-3, pp.213-220, 2004.
DOI : 10.1016/j.dam.2004.02.015

[. Padró and I. Gracia, Linear broadcast encryption schemes, Discrete Applied Mathematics, vol.128, issue.1, pp.223-238, 2003.
DOI : 10.1016/S0166-218X(02)00447-X

R. Douglas and . Stinson, On some methods for unconditionally secure key distribution and broadcast encryption, Des. Codes Cryptography, vol.12, issue.3, pp.215-243, 1997.