{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T15:07:11Z","timestamp":1753888031197,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540004202"},{"type":"electronic","value":"9783540364139"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36413-7_9","type":"book-chapter","created":{"date-parts":[[2007,7,16]],"date-time":"2007-07-16T15:44:57Z","timestamp":1184600697000},"page":"119-132","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Efficient Re-keying Protocols for Multicast Encryption"],"prefix":"10.1007","author":[{"given":"Giovanni Di","family":"Crescenzo","sequence":"first","affiliation":[]},{"given":"Olga","family":"Kornievskaia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,3,14]]},"reference":[{"key":"9_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-48000-6_27","volume-title":"A quick group key distribution scheme with entity revocation","author":"J. Anzai","year":"1999","unstructured":"J. Anzai, N. Matsuzaki and T. Matsumoto, A quick group key distribution scheme with entity revocation. In Proceedings of \u201cAdvances in Cryptology-ASIACRYPT 99\u201d, Lecture Notes in Computer Science, Springer Verlag, 1999."},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"K. Becker and U. Wille. Communication complexity of group key distribution. In Proceedings of the 5th ACM Conference on Computer and Communication Security, San Francisco, CA, November 1998.","DOI":"10.1145\/288090.288094"},{"key":"9_CR3","series-title":"Lect Notes Comput Sci","volume-title":"A secure and efficient conference key distribution system","author":"M. Burmester","year":"1994","unstructured":"M. Burmester and Y. Desmedt. A secure and efficient conference key distribution system. In Proceedings of \u201cAdvances in Cryptology-EUROCRYPT\u201994\u201d, Lecture Notes in Computer Science, 1994."},{"key":"9_CR4","series-title":"Lect Notes Comput Sci","volume-title":"Space Requirements for Broadcast Encryption","author":"C. Blundo","year":"1994","unstructured":"C. Blundo and A. Cresti. Space Requirements for Broadcast Encryption. In Proceedings of \u201cAdvances in Cryptology-EUROCRYPT\u201994\u201d, Lecture Notes in Computer Science, 1994."},{"key":"9_CR5","series-title":"Lect Notes Comput Sci","volume-title":"Trade-Offs between communication and storage in unconditionally secure systems for broadcast encryption and interactive key-distribution","author":"C. Blundo","year":"1996","unstructured":"C. Blundo, L. Frota Mattos and D. Stinson. Trade-Offs between communication and storage in unconditionally secure systems for broadcast encryption and interactive key-distribution. In Proceedings of \u201cAdvances in Cryptology-CRYPTO\u201996\u201d, Lecture Notes in Computer Science, 1996."},{"key":"9_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48071-4_33","volume-title":"Perfectly-secure key distribution for dynamic conferences","author":"C. Blundo","year":"1993","unstructured":"C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, Perfectly-secure key distribution for dynamic conferences. In Proceedings of \u201cAdvances in Cryptology-CRYPTO\u201992\u201d, Lecture Notes in Computer Science, 1993."},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"R. Canetti, J. Garay, G. Itkis, D. Miccianco, M. Naor, and B. Pinkas. Multicast security: A taxonomy and efficient authentication. In IEEE INFOCOMM, 1999.","DOI":"10.1109\/INFCOM.1999.751457"},{"key":"9_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_32","volume-title":"Efficient communication storage tradeoffs for multicast encryption","author":"R. Canetti","year":"1999","unstructured":"R. Canetti, T. Malkin, and K. Nissim. Efficient communication storage tradeoffs for multicast encryption. In Proceedings of \u201cAdvances in Cryptology-EUROCRYPT\u2019 99\u201d, Lecture Notes in Computer Science, Springer Verlag, 1999."},{"key":"9_CR9","unstructured":"R. Canetti and B. Pinkas. A taxonomy of multicast security issues. Internet Draft, August 2000."},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"I. Chang, R. Engel, D. Kandlur, D. Pendarakis, and D. Saha. Key management for secure internet multicast using boolean function minimization techniques. In IEEE INFOCOMM, 1999.","DOI":"10.1109\/INFCOM.1999.751455"},{"key":"9_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48329-2_40","volume-title":"Broadcast Encryption","author":"A. Fiat","year":"1994","unstructured":"A. Fiat and M. Naor, Broadcast Encryption. In Proceedings of \u201cAdvances in Cryptology-CRYPTO 93\u201d, Lecture Notes in Computer Science, Springer Verlag, 1994."},{"key":"9_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45708-9_4","volume-title":"The LSD Broadcast Encryption Scheme","author":"D. Halevy","year":"2002","unstructured":"D. Halevy and A. Shamir, The LSD Broadcast Encryption Scheme, In Proceedings of \u201cAdvances in Cryptology-CRYPTO 02\u201d, Lecture Notes in Computer Science, Springer Verlag, 2002."},{"issue":"5","key":"9_CR13","doi-asserted-by":"publisher","first-page":"714","DOI":"10.1109\/TIT.1982.1056542","volume":"28","author":"I. Ingemarsson","year":"1982","unstructured":"I. Ingemarsson, D. Tang, and C. Wong. A conference key distribution system. IEEE Transactions on Information Theory, 28(5):714\u2013720, September 1982.","journal-title":"IEEE Transactions on Information Theory"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Y. Kim, A. Perrig, and G. Tsudik. Simple and fault-tolerant key agreement for dynamic collaborative groups. In Proceedings of the 7th ACM Conference on Computer and Communication Security, CCS\u201900, November 2000.","DOI":"10.1145\/352600.352638"},{"key":"9_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054150","volume-title":"Combinatorial bounds for broadcast encryption","author":"M. Luby","year":"1998","unstructured":"M. Luby and J. Staddon. Combinatorial bounds for broadcast encryption. In Proceedings of \u201cAdvances in Cryptology-EUROCRYPT\u201998\u201d, Lecture Notes in Computer Science, Springer Verlag, 1998."},{"key":"9_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_3","volume-title":"Revocation and Tracing Schemes for Stateless Receivers","author":"S. Naor","year":"2001","unstructured":"S. Naor, M. Naor, and J. Lotspiech, Revocation and Tracing Schemes for Stateless Receivers, In Proceedings of \u201cAdvances in Cryptology-CRYPTO 01\u201d, Lecture Notes in Computer Science, Springer Verlag, 2001."},{"key":"9_CR17","unstructured":"A. Perrig. Efficient collaborative key management protocols for secure autonomous group communication. In CryptTEC, 1999."},{"key":"9_CR18","series-title":"Lect Notes Comput Sci","volume-title":"An information theoretic analysis of rooted-tree based secure multicast key distribution","author":"R. Poovendram","year":"1999","unstructured":"R. Poovendram and J. Baras. An information theoretic analysis of rooted-tree based secure multicast key distribution. In Proceedings of \u201cAdvances in Cryptology-CRYPTO\u201999\u201d, Lecture Notes in Computer Science, Springer Verlag, 1999."},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"R. Safavi-Naini and H. Wang. New constructions for multicast re-keying schemes using perfect hash families. In Proceedings of the 7th ACM Conference on Computer and Communication Security, CCS\u201900, Ahtens, Greece, 2000.","DOI":"10.1145\/352600.352637"},{"key":"9_CR20","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.1988.13369","volume-title":"A secure audio teleconference system","author":"D. Steer","year":"1988","unstructured":"D. Steer, L. Strawczynski, W. Diffie, and W. Wiener. A secure audio teleconference system. In Proceedings of \u201cAdvances in Cryptology-CRYPTO\u201988\u201d, Lecture Notes in Computer Science, Springer Verlag, Santa Barbara, CA, August 1988."},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"M. Steiner, G. Tsudik, and M. Waidner. Key agreement in dynamic peer groups. In IEEE Transactions on Parallel and Distributed Systems, 2000.","DOI":"10.1109\/71.877936"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"D. Wallner, E. Harder, and R. Agee. Key management for multicast: Issues and architectures. RFC 2627, June 1999.","DOI":"10.17487\/rfc2627"},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"C. Wong, M. Gouda, and S. Lam. Secure group communication using key graphs. In Proceedings of the ACM SIGCOMM\u201998, September 1998.","DOI":"10.1145\/285237.285260"}],"container-title":["Lecture Notes in Computer Science","Security in Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36413-7_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,6]],"date-time":"2021-01-06T05:06:42Z","timestamp":1609909602000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36413-7_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540004202","9783540364139"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/3-540-36413-7_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]},"assertion":[{"value":"14 March 2003","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}