Keyword : broadcast encryption


Unconditionally Secure Broadcast Encryption Schemes with Trade-Offs between Communication and Storage
Yohei WATANABE Junji SHIKATA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/06/01
Vol. E99-A  No. 6 ; pp. 1097-1106
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
broadcast encryptionkey predistribution systemsinformation theoretic securityunconditional security
 Summary | Full Text:PDF(578.2KB)

Efficient Usage of Cover Free Families in Broadcast Encryption
Maki YOSHIDA Toru FUJIWARA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/06/01
Vol. E99-A  No. 6 ; pp. 1216-1221
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
cover free familyefficiencybroadcast encryptionupper bound
 Summary | Full Text:PDF(623.1KB)

Transmission-Efficient Broadcast Encryption Scheme with Personalized Messages
Jin Ho HAN Jong Hwan PARK Dong Hoon LEE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/04/01
Vol. E96-A  No. 4 ; pp. 796-806
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
broadcast encryptionconditional access systemcopyright protectionbilinear pairingspersonalized messages
 Summary | Full Text:PDF(924.1KB)

An Optimal Identity-Based Broadcast Encryption Scheme for Wireless Sensor Networks
Intae KIM SeongOun HWANG 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2013/03/01
Vol. E96-B  No. 3 ; pp. 891-895
Type of Manuscript:  LETTER
Category: Fundamental Theories for Communications
Keyword: 
cryptographybroadcast encryptionidentity-based encryptionsensor network
 Summary | Full Text:PDF(244.7KB)

Layered Multicast Encryption of Motion JPEG2000 Code Streams for Flexible Access Control
Takayuki NAKACHI Kan TOYOSHIMA Yoshihide TONOMURA Tatsuya FUJII 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/05/01
Vol. E95-D  No. 5 ; pp. 1301-1312
Type of Manuscript:  Special Section PAPER (Special Section on Recent Advances in Multimedia Signal Processing Techniques and Applications)
Category: Video Processing
Keyword: 
layered multicastbroadcast encryptionMotion JPEG2000
 Summary | Full Text:PDF(2MB)

Secure Broadcast System with Simultaneous Individual Messaging
Arisa FUJII Go OHTAKE Goichiro HANAOKA Nuttapong ATTRAPADUNG Hajime WATANABE Kazuto OGAWA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/06/01
Vol. E94-A  No. 6 ; pp. 1328-1337
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
digital broadcastingcopyright protectionConditional Access System (CAS)broadcast encryption
 Summary | Full Text:PDF(729.8KB)

Improved Subset Difference Method with Ternary Tree
Kazuhide FUKUSHIMA Shinsaku KIYOMOTO Toshiaki TANAKA Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/11/01
Vol. E93-A  No. 11 ; pp. 2034-2044
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
broadcast encryptionsubset difference methodternary tree
 Summary | Full Text:PDF(806.8KB)

Birthday Paradox Based Security Analysis of Certain Broadcast Encryption Schemes
Miodrag J. MIHALJEVI Marc P.C. FOSSORIER Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/06/01
Vol. E90-A  No. 6 ; pp. 1248-1251
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
conditional data access controlbroadcast encryptioncryptographic key managementcryptanalysisbirthday paradox
 Summary | Full Text:PDF(72.7KB)

Practical Broadcast Encryption from Graph-Theoretic Techniques and Subset-Incremental-Chain Structure
Nuttapong ATTRAPADUNG Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/01/01
Vol. E90-A  No. 1 ; pp. 187-203
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Application
Keyword: 
broadcast encryptionrevocation scheme
 Summary | Full Text:PDF(678KB)

A Lightweight Tree Based One-Key Broadcast Encryption Scheme
Tomoyuki ASANO Kazuya KAMIO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/07/01
Vol. E89-A  No. 7 ; pp. 2019-2028
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
broadcast encryptionstateless receivercomplete subtree methodRabin cryptosystem
 Summary | Full Text:PDF(261.1KB)

Using Trapdoor Permutations in a Complete Subtree Method for Broadcast Encryption
Ryo NOJIMA Yuichi KAJI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/02/01
Vol. E88-A  No. 2 ; pp. 568-574
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
key managementbroadcast encryptionstateless receiverstrapdoor permutationsclaw-free permutations
 Summary | Full Text:PDF(172KB)

Reducing Receiver's Storage in CS, SD and LSD Broadcast Encryption Schemes
Tomoyuki ASANO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1 ; pp. 203-210
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Application
Keyword: 
broadcast encryptionstateless receivercomplete subtreesubset differencemaster keytrapdoor one-way permutation
 Summary | Full Text:PDF(217KB)

Secure, Efficient and Practical Key Management Scheme in the Complete-Subtree Method
Ryo NOJIMA Yuichi KAJI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1 ; pp. 189-194
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Application
Keyword: 
key managementbroadcast encryptioncomplete subtree methodstateless receiverstrapdoor permutationsrandom oracle model
 Summary | Full Text:PDF(161.4KB)

A Flexible Method for Masked Sharing of Group Keys
Jun ANZAI Natsume MATSUZAKI Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/01/01
Vol. E84-A  No. 1 ; pp. 239-246
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
broadcast encryptionuser exclusion problem
 Summary | Full Text:PDF(271.9KB)