Keyword List
Japanese Page
SITE TOP
Login
To browse Full-Text PDF.
>
Forgotten your password?
Menu
Search
Full-Text Search
Search(JPN)
Latest Issue
A Fundamentals
Trans.Fundamentals.
JPN Edition(in Japanese)
B Communications
Trans.Commun.
JPN Edition(in Japanese)
C Electronics
Trans.Electron.
JPN Edition(in Japanese)
D Information & Systems
Trans.Inf.&Syst.
JPN Edition(in Japanese)
Abstracts of JPN Edition
Trans.Fundamentals.
Trans.Commun.
Trans.Electron.
Trans.Inf.&Syst.
-
Archive
Volume List
Trans.Fundamentals.
Trans.Commun.
Trans.Electron.
Trans.Inf.&Syst.
Transactions (1976-1990)
Volume List [JPN Edition]
A JPN Edition(in Japanese)
B JPN Edition(in Japanese)
C JPN Edition(in Japanese)
D JPN Edition(in Japanese)
-
Editorial Board
Editorial Board
Trans.Fundamentals.
Trans.Commun.
Trans.Electron.
Trans.Inf.&Syst.
Archive
Editorial Board[JPN Edition]
A JPN Edition(in Japanese)
B JPN Edition(in Japanese)
C JPN Edition(in Japanese)
D JPN Edition(in Japanese)
Archive
-
Open Access Papers
Trans. Commun. (Free)
Trans. Commun.
Trans. Commun.(JPN Edition)
Trans. Electron. (Free)
Trans. Electron.
Trans. Electron.(JPN Edition)
Trans. Inf.&Syst. (Free)
Trans. Inf.&Syst.
Trans. Inf.&Syst.(JPN Edition)
-
Link
Subscription
For Authors
Statistics:
Accepting ratio,review period etc.
IEICE Home Page
-
Others
Citation Index
Privacy Policy
Copyright & Permissions
Copyright (c) by IEICE
Keyword : trapdoor permutations
Using Trapdoor Permutations in a Complete Subtree Method for Broadcast Encryption
Ryo NOJIMA
Yuichi KAJI
Publication:
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date:
2005/02/01
Vol.
E88-A
No.
2
;
pp.
568-574
Type of Manuscript:
PAPER
Category:
Information Security
Keyword:
key management
,
broadcast encryption
,
stateless receivers
,
trapdoor permutations
,
claw-free permutations
,
Summary
|
Full Text:PDF
Secure, Efficient and Practical Key Management Scheme in the Complete-Subtree Method
Ryo NOJIMA
Yuichi KAJI
Publication:
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date:
2005/01/01
Vol.
E88-A
No.
1
;
pp.
189-194
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security)
Category:
Application
Keyword:
key management
,
broadcast encryption
,
complete subtree method
,
stateless receivers
,
trapdoor permutations
,
random oracle model
,
Summary
|
Full Text:PDF