{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T14:22:28Z","timestamp":1737037348350,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540438618"},{"type":"electronic","value":"9783540454502"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45450-0_4","type":"book-chapter","created":{"date-parts":[[2007,5,19]],"date-time":"2007-05-19T20:53:10Z","timestamp":1179607990000},"page":"40-55","source":"Crossref","is-referenced-by-count":5,"title":["A Secure Re-keying Scheme with Key Recovery Property"],"prefix":"10.1007","author":[{"given":"Hartono","family":"Kurnio","sequence":"first","affiliation":[]},{"given":"Rei","family":"Safavi-Naini","sequence":"additional","affiliation":[]},{"given":"Huaxiong","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,6,21]]},"reference":[{"key":"4_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/3-540-48390-X_11","volume-title":"Financial Cryptography\u2019 99","author":"M. Abdalla","year":"1999","unstructured":"M. Abdalla, Y. Shavitt and A. Wool. Towards Making Broadcast Encryption Practical. Financial Cryptography\u2019 99, Lecture Notes in Computer Science 1648, pages 140\u2013152, 1999."},{"key":"4_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1007\/978-3-540-48000-6_27","volume-title":"Advances in Cryptology-ASIACRYPT\u2019 99","author":"J. Anzai","year":"1999","unstructured":"J. Anzai, N. Matsuzaki and T. Matsumoto. A Quick Group Key Distribution Scheme with \u201cEntity Revocation\u201d. Advances in Cryptology-ASIACRYPT\u2019 99, Lecture Notes in Computer Science 1716, pages 333\u2013347, 1999."},{"key":"4_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/BFb0053444","volume-title":"Advances in Cryptology-EUROCRYPT\u2019 94","author":"C. Blundo","year":"1994","unstructured":"C. Blundo and A. Cresti. Space Requirements for Broadcast Encryption. Advances in Cryptology-EUROCRYPT\u2019 94, Lecture Notes in Computer Science 950, pages 287\u2013298, 1994."},{"key":"4_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/3-540-68697-5_29","volume-title":"Advances in Cryptology-CRYPTO\u2019 96","author":"C. Blundo","year":"1996","unstructured":"C. Blundo, L. A. Frota Mattos and D. Stinson. Trade-offs Between Communication and Storage in Unconditionally Secure Systems for Broadcast Encryption and Interactive Key Distribution. Advances in Cryptology-CRYPTO\u2019 96, Lecture Notes in Computer Science 1109, pages 387\u2013400, 1996."},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"J. W. Byers, M. Luby, M. Mitzenmacher and A. Rege. A Digital Fountain Approach to Reliable Distribution of Bulk Data. Proceedings of the ACM SIGCOMM\u2019 98, 1998.","DOI":"10.1145\/285237.285258"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor and B. Pinkas. Issues in Multicast Security: A Taxonomy and Efficient Constructions. Proceedings of INFOCOM\u2019 99, pages 708\u2013716, 1999.","DOI":"10.1109\/INFCOM.1999.751457"},{"key":"4_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1007\/3-540-48910-X_32","volume-title":"Advances in Cryptology-EUROCRYPT\u2019 99","author":"R. Canetti","year":"1999","unstructured":"R. Canetti, T. Malkin and K. Nissim. Efficient Communication-Storage Tradeoffs for Multicast Encryption. Advances in Cryptology-EUROCRYPT\u2019 99, Lecture Notes in Computer Science 1592, pages 459\u2013474, 1999."},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"I. Chang, R. Engel, D. Kandlur, D. Pendarakis and D. Saha. Key Management for Secure Internet Multicast Using Boolean Function Minimization Techniques. Proceedings of INFOCOM\u2019 99, pages 689\u2013698, 1999.","DOI":"10.1109\/INFCOM.1999.751455"},{"key":"4_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1007\/3-540-48329-2_40","volume-title":"Advances in Cryptology-CRYPTO\u2019 93","author":"A. Fiat","year":"1994","unstructured":"A. Fiat and M. Naor. Broadcast Encryption. Advances in Cryptology-CRYPTO\u2019 93, Lecture Notes in Computer Science 773, pages 480\u2013491, 1994."},{"key":"4_CR10","unstructured":"FIPS 180-1. Secure Hash Standard. NIST, US Department of Commerce, Washington D.C., April 1995."},{"key":"4_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"609","DOI":"10.1007\/3-540-48405-1_38","volume-title":"Advances in Cryptology-CRYPTO\u2019 99","author":"R. Kumar","year":"1999","unstructured":"R. Kumar, S. Rajagopalan and A. Sahai. Coding Constructions for Blacklisting Problems Without Computational Assumptions. Advances in Cryptology-CRYPTO\u2019 99, Lecture Notes in Computer Science 1666, pages 609\u2013623, 1999."},{"key":"4_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1007\/3-540-45861-1_13","volume-title":"Information Security and Cryptology-ICISC 2001","author":"H. Kurnio","year":"2002","unstructured":"H. Kurnio, R. Safavi-Naini and H. Wang. Efficient Revocation Schemes for Secure Multicast. Information Security and Cryptology-ICISC 2001, Lecture Notes in Computer Science 2288, pages 160\u2013177, 2002."},{"key":"4_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"512","DOI":"10.1007\/BFb0054150","volume-title":"Advances in Cryptology-EUROCRYPT\u2019 98","author":"M. Luby","year":"1998","unstructured":"M. Luby and J. Staddon. Combinatorial Bounds for Broadcast Encryption. Advances in Cryptology-EUROCRYPT\u2019 98, Lecture Notes in Computer Science 1403, pages 512\u2013526, 1998."},{"key":"4_CR14","unstructured":"D. A. McGrew and A. T. Sherman. Key Establishment in Large Dynamic Groups Using One-Way Function Trees. Manuscript, 1998."},{"key":"4_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/3-540-44647-8_3","volume-title":"Advances in Cryptology-CRYPTO 2001","author":"D. Naor","year":"2001","unstructured":"D. Naor, M. Naor and J. Lotspiech. Revocation and Tracing Schemes for Stateless Receivers. Advances in Cryptology-CRYPTO 2001, Lecture Notes in Computer Science 2139, pages 41\u201362, 2001."},{"key":"4_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-45472-1_1","volume-title":"Financial Cryptography 2000","author":"M. Naor","year":"2001","unstructured":"M. Naor and B. Pinkas. Efficient Trace and Revoke Schemes. Financial Cryptography 2000, Lecture Notes in Computer Science 1962, pages 1\u201320, 2001."},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"A. Perrig, D. Song and J. D. Tygar. ELK, a New Protocol for Efficient Large-Group Key Distribution. IEEE Symposium on Security and Privacy 2001, pages 247\u2013262, 2001.","DOI":"10.1109\/SECPRI.2001.924302"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"M. O. Rabin. The Information Dispersal Algorithm and Its Applications. Sequences: Combinatorics, Compression, Security and Transmission, pages 406\u2013419, 1990.","DOI":"10.1007\/978-1-4612-3352-7_32"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"R. Rivest. The MD5 Message Digest Algorithm. RFC 1321, April 1992.","DOI":"10.17487\/rfc1321"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"R. Safavi-Naini and H. Wang. New Constructions for Multicast Re-keying Schemes Using Perfect Hash Families. 7th ACM Conference on Computer and Communication Security, ACM Press, pages 228\u2013234, 2000.","DOI":"10.1145\/352600.352637"},{"key":"4_CR21","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"A. Shamir. How to Share a Secret. Communications of the ACM 22, pages 612\u2013613, 1979.","journal-title":"Communications of the ACM"},{"key":"4_CR22","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1023\/A:1008209004667","volume":"15","author":"D. R. Stinson","year":"1998","unstructured":"D. R. Stinson and T. van Trung. Some New Results on Key Distribution Patterns and Broadcast Encryption. Designs, Codes and Cryptography 15, pages 261\u2013279, 1998.","journal-title":"Designs, Codes and Cryptography"},{"key":"4_CR23","unstructured":"D. M. Wallner, E. J. Harder and R. C. Agee. Key Management for Multicast: Issues and Architectures. Internet Draft (draft-wallner-key-arch-01.txt), ftp:\/\/ftp.ietf.org\/internet-drafts\/draft-wallner-key-arch-01.txt ."},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"C. K. Wong, M. Gouda and S. S. Lam. Secure Group Communication Using Key Graphs. Proceedings of SIGCOMM\u2019 98, pages 68\u201379, 1998.","DOI":"10.1145\/285237.285260"},{"key":"4_CR25","unstructured":"C. K. Wong and S. S. Lam. Keystone: A Group Key Management Service. International Conference on Telecommunications, ICT 2000, 2000."},{"key":"4_CR26","series-title":"Lect Notes Comput Sci","first-page":"83","volume-title":"Advances in Cryptology-AUSCRYPT\u2019 92","author":"Y. Zheng","year":"1993","unstructured":"Y. Zheng, J. Pieprzyk and J. Seberry. HAVAL-A One-Way Hashing Algorithm with Variable Length of Output. Advances in Cryptology-AUSCRYPT\u2019 92, Lecture Notes in Computer Science 718, pages 83\u2013104, 1993."}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45450-0_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T13:32:11Z","timestamp":1737034331000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45450-0_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540438618","9783540454502"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/3-540-45450-0_4","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}