{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:38:16Z","timestamp":1725485896267},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540007166"},{"type":"electronic","value":"9783540365525"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36552-4_33","type":"book-chapter","created":{"date-parts":[[2007,6,6]],"date-time":"2007-06-06T23:22:37Z","timestamp":1181172157000},"page":"478-496","source":"Crossref","is-referenced-by-count":2,"title":["A Dynamic Group Key Distribution Scheme with Flexible User Join"],"prefix":"10.1007","author":[{"given":"Hartono","family":"Kurnio","sequence":"first","affiliation":[]},{"given":"Luk","family":"McAven","sequence":"additional","affiliation":[]},{"given":"Rei","family":"Safavi-Naini","sequence":"additional","affiliation":[]},{"given":"Huaxiong","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,3,14]]},"reference":[{"key":"33_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1007\/978-3-540-48000-6_27","volume-title":"Advances in Cryptology-ASIACRYPT\u2019 99","author":"J. Anzai","year":"1999","unstructured":"J. Anzai, N. Matsuzak and T. Matsumoto. A Quick Group Key Distribution Scheme with \u201cntity Revocat on \u201d Advances in Cryptology-ASIACRYPT\u2019 99, LNCS 1716, 333\u2013347, 1999. 479,481,494"},{"key":"33_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1007\/3-540-39757-4_22","volume-title":"Advances in Cryptology-EUROCRYPT\u2019 84","author":"R. Blom","year":"1985","unstructured":"R. Blom. An Optimal Class of Symmetric Key Generation Systems. Advances in Cryptology-EUROCRYPT\u2019 84, LNCS 209, 335\u2013338, 1985. 480,485"},{"key":"33_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1007\/3-540-48071-4_33","volume-title":"Advances in Cryptology-CRYPTO\u201992","author":"C. Blundo","year":"1993","unstructured":"C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro and M. Yung. Perfectly Secure Key Distribution for Dynamic Conferences. Advances in Cryptology-CRYPTO\u201992, LNCS 740 471\u2013486, 1993. 480"},{"key":"33_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1007\/BFb0054851","volume-title":"The Decision Diffie-Hellman Problem","author":"D. Boneh","year":"1998","unstructured":"D. Boneh. The Decision Diffie-Hellman Problem. 3rd Algorithmic Number Theory Symposium, LNCS 1423 48\u201363, 1998. 492"},{"key":"33_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1007\/3-540-48910-X_32","volume-title":"Advances in Cryptology-EUROCRYPT\u2019 99","author":"R. Canett","year":"1999","unstructured":"R. Canett, T. Malkin and K. Nissim. Efficient Commun cat on-Storage Tradeoffs for Multicast Encryption. Advances in Cryptology-EUROCRYPT\u2019 99, LNCS 1592 459\u2013474, 1999.480"},{"key":"33_CR6","unstructured":"C. Charnes and J. Pieprzyk. Cumulative Arrays and Generalised Shamir Secret Sharing Schemes. 17th Annual Computer Science Conference (ACSC-17), 519\u2013528, 1994.483"},{"key":"33_CR7","series-title":"Lect Notes Comput Sci","first-page":"307","volume-title":"Advances in Cryptology-CRYPTO\u2019 89","author":"Y. Desmedt","year":"1989","unstructured":"Y. Desmedt and Y. Frankel. Threshold Cryptosystems. Advances in Cryptology-CRYPTO\u2019 89, LNCS 435 307\u2013315, 1989."},{"key":"33_CR8","unstructured":"Y. Desmedt and S. Jajodia. Redistributing secret shares to new access structures and ts applications. Preprint 1997. 493"},{"key":"33_CR9","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M. Hellman. New Directions in Cryptography. IEEE Trans. Inform. Theory 22 644\u2013654, 1976.481","journal-title":"IEEE Trans. Inform. Theory"},{"key":"33_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1007\/3-540-48329-2_40","volume-title":"Advances in Cryptology-CRYPTO\u2019 93","author":"A. Fiat","year":"1994","unstructured":"A. Fiat and M. Naor. Broadcast Encrypton. Advances in Cryptology-CRYPTO\u2019 93, LNCS 773 480\u2013491, 1994. 479,480"},{"key":"33_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1007\/3-540-57220-1_51","volume-title":"Advances in Cryptology-AUSCRYPT\u2019 92","author":"W.-A. Jackson","year":"1993","unstructured":"W.-A. Jackson and K. Martin. Cumulative Arrays and Geometric Secret Sharing Schemes. Advances in Cryptology-AUSCRYPT\u2019 92, LNCS 718 48\u201355, 1993. 483"},{"key":"33_CR12","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/TIT.1983.1056621","volume":"29","author":"E. Karnin","year":"1983","unstructured":"E. Karnin, J. Greene and M. Hellman. On Secret Sharing Systems. IEEE Transactions on Information Theory vol. 29, 35\u201341, 1983.484","journal-title":"IEEE Transactions on Information Theory"},{"key":"33_CR13","doi-asserted-by":"crossref","unstructured":"Y. Kim, A. Perrig and G. Tsudik. Simple and Fault-Tolerance Key Agreement for Dynamic Collaborative Groups. 7th ACM Conference on Computer and Communications Security ACM Press, 235\u2013244, 2000.480","DOI":"10.1145\/352600.352638"},{"key":"33_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"609","DOI":"10.1007\/3-540-48405-1_38","volume-title":"Advances in Cryptology-CRYPTO\u2019 99","author":"R. Kumar","year":"1999","unstructured":"R. Kumar, S. Rajagopalan and A. Sahai. Coding Constructions for Blacklisting Problems Without Computational Assumptions. Advances in Cryptology-CRYPTO\u2019 99, LNCS 1666 609\u2013623, 1999.480"},{"key":"33_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/10718964_15","volume-title":"Information Security and Privacy-ACISP 2000","author":"H. Kurnio","year":"2000","unstructured":"H. Kurnio, R. Safavi-Naini, W. Susilo and H. Wang. Key Management for Secure Multicast with Dynamic Controller. Information Security and Privacy-ACISP 2000, LNCS 1841 178\u2013190, 2000.480"},{"key":"33_CR16","unstructured":"H. Kurnio, R. Safavi-Nain and H. Wang. A Group Key Distribution Scheme with Decentralised User Join. Pre-Proceedings of 3rd Conference on Security in Communication Networks-SCN 2002 2002. 484,486"},{"key":"33_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"512","DOI":"10.1007\/BFb0054150","volume-title":"Advances in Cryptology-EUROCRYPT\u2019 98","author":"M. Luby","year":"1998","unstructured":"M. Luby and J. Staddon. Comb nator al Bounds for Broadcast Encryption. Advances in Cryptology-EUROCRYPT\u2019 98, LNCS 1403 512\u2013526, 1998. 479,480"},{"key":"33_CR18","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1007\/3-540-48184-2_14","volume-title":"Advances in Cryptology-CRYPTO\u2019 87","author":"T. Matsumoto","year":"1988","unstructured":"T. Matsumoto and H. Imai. On a Key Predistribution System-A Pract cal Solution to the Key Distribution Problem. Advances in Cryptology-CRYPTO\u2019 87, LNCS 293 185\u2013193, 1988. 480"},{"key":"33_CR19","unstructured":"D.A. McGrew and A.T. Sherman. Key Establishment in Large Dynamic Groups Using One-Way Function Trees. Manuscript, 1998.480"},{"key":"33_CR20","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/0166-218X(88)90068-6","volume":"21","author":"C.J. Mitchell","year":"1988","unstructured":"C.J. Mitchell and F.C. Piper. Key Storage in Secure Networks. Discrete Applied Mathematics 21 215\u2013228, 1988.480","journal-title":"Discrete Applied Mathematics"},{"key":"33_CR21","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-45472-1_1","volume-title":"Financial Cryptog-raphy 2000","author":"M. Naor","year":"2001","unstructured":"M. Naor and B. Pinkas. Efficient Trace and Revoke Schemes. Financial Cryptog-raphy 2000, LNCS 1962 1\u201320, 2001. 479,481"},{"key":"33_CR22","doi-asserted-by":"crossref","unstructured":"R. Safav-Nain and H. Wang. New Constructions for Mult cast Re-keying Schemes using Perfect Hash Families. 7th ACM Conference on Computer and Communications Security ACM Press, 228\u2013234, 2000. 479,480,494","DOI":"10.1145\/352600.352637"},{"key":"33_CR23","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"A. Shamir. How to Share a Secret.Communications of the ACM 22 612\u2013613, 1979. 481,483","journal-title":"Communications of the ACM"},{"key":"33_CR24","first-page":"71","volume":"1","author":"G. Simmons","year":"1991","unstructured":"G. Simmons, W.-A. Jackson and K. Martin. The Geometry of Shared Secret Schemes. Bulletin of the Institute of Combinatorics and its Applications (ICA), vol. 1, 71\u201388, 1991. 483","journal-title":"Bulletin of the Institute of Combinatorics and its Applications (ICA)"},{"issue":"8","key":"33_CR25","doi-asserted-by":"publisher","first-page":"769","DOI":"10.1109\/71.877936","volume":"11","author":"M. Steiner","year":"2000","unstructured":"M. Steiner, G. Tsudik and M. Waidner. Key Agreement in Dynamic Peer Groups. IEEE Transactions on Parallel and Distributed Systems 11 no. 8, 769\u2013780, 2000. 481","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"33_CR26","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1023\/A:1008209004667","volume":"15","author":"D.R. Stinson","year":"1998","unstructured":"D.R. Stinson and T. van Trung. Some New Results on Key Distribution Patterns and Broadcast Encrypton. Designs, Codes and Cryptography 15 261\u2013279, 1998. 479,480","journal-title":"Designs, Codes and Cryptography"},{"key":"33_CR27","unstructured":"D.M. Wallner, E.J. Harder and R.C. Agee. Key Management for Multi-cast:Issues and Arch tectures. Internet Draft (draft-wallner-key-arch-01.txt), ftp:\/\/ftp.ietf.org\/internet-drafts\/draft-wallner-key-arch-01.txt 480"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology \u2014 ICISC 2002"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36552-4_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T19:37:27Z","timestamp":1556480247000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36552-4_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540007166","9783540365525"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/3-540-36552-4_33","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}