Advanced access content system Lower bounds for subset cover based broadcast encryption Sequential key derivation patterns for broadcast encryption and key predistribution schemes How to broadcast a secret, AKI03] Nuttapong Attrapadung, Kazukuni Kobara, and Hideki ImaiBer91] Shimshon Berkovits EUROCRYPT, pp.343-356, 1991. ,
Tracing Traitors, Digital Rights Management [DRM]. [FN93], pp.257-270, 1994. ,
DOI : 10.1007/3-540-48658-5_25
Broadcast Encryption, Lecture Notes in Computer Science, vol.773, pp.480-491, 1993. ,
DOI : 10.1007/3-540-48329-2_40
The LSD Broadcast Encryption Scheme, Lecture Notes in Computer Science, vol.2442, pp.47-60, 2002. ,
DOI : 10.1007/3-540-45708-9_4
One-Way Chain Based Broadcast Encryption Schemes, Lecture Notes in Computer Science, vol.3494, pp.559-574, 2005. ,
DOI : 10.1007/11426639_33
Combinatorial bounds for broadcast encryption, EUROCRYPT, pp.512-526, 1998. ,
DOI : 10.1007/BFb0054150
Establishing the broadcast efficiency of the Subset Difference Revocation Scheme, Designs, Codes and Cryptography, vol.51, issue.3, pp.315-334, 2009. ,
DOI : 10.1007/s10623-008-9263-x
Revocation and Tracing Schemes for Stateless Receivers, Lecture Notes in Computer Science, vol.2139, pp.41-62, 2001. ,
DOI : 10.1007/3-540-44647-8_3
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.100.8970
Threshold traitor tracing On the mean number of encryptions for treebased broadcast encryption schemes, CRYPTO, volume 1462 of Lecture Notes in Computer Science, pp.502-517215, 1998. ,
Improving the trade-off between storage and communication in broadcast encryption schemes, Discrete Applied Mathematics, vol.143, issue.1-3, pp.213-220, 2004. ,
DOI : 10.1016/j.dam.2004.02.015
Linear broadcast encryption schemes, Discrete Applied Mathematics, vol.128, issue.1, pp.223-238, 2003. ,
DOI : 10.1016/S0166-218X(02)00447-X
On some methods for unconditionally secure key distribution and broadcast encryption, Des. Codes Cryptography, vol.12, issue.3, pp.215-243, 1997. ,