Some Bounds and a Construction for Secure Broadcast Encryption.
Kaoru KurosawaTakuya YoshidaYvo DesmedtMike BurmesterPublished in: ASIACRYPT (1998)
Keyphrases
- key management
- key exchange
- data encryption
- security properties
- digital signature
- encryption scheme
- upper bound
- cryptographic protocols
- security analysis
- stream cipher
- integrity verification
- lower bound
- upper and lower bounds
- cryptographic algorithms
- secure communication
- private key
- data confidentiality
- security requirements
- encryption decryption
- worst case
- advanced encryption standard
- security level
- high security
- security protocols
- security mechanisms
- secret key
- sensitive data
- lower and upper bounds
- data protection
- public key cryptography
- public key infrastructure
- information security
- wireless sensor networks