{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T04:07:24Z","timestamp":1778299644698,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540663621","type":"print"},{"value":"9783540483908","type":"electronic"}],"license":[{"start":{"date-parts":[[1999,1,1]],"date-time":"1999-01-01T00:00:00Z","timestamp":915148800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-48390-x_11","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T11:10:11Z","timestamp":1188299411000},"page":"140-157","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Towards Making Broadcast Encryption Practical"],"prefix":"10.1007","author":[{"given":"Michel","family":"Abdalla\u22c6","sequence":"first","affiliation":[]},{"given":"Yuval","family":"Shavitt","sequence":"additional","affiliation":[]},{"given":"Avishai","family":"Wool","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1999,8,30]]},"reference":[{"key":"11_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/BFb0053444","volume-title":"Advances in Cryptology-EUROCRYPT\u201994","author":"C. Blundo","year":"1994","unstructured":"C. Blundo and A. Cresti. Space requirements for broadcast encryption. In A. De Santis, editor, Advances in Cryptology-EUROCRYPT\u201994, LNCS 950, pages 287\u2013298. Springer-Verlag, 1994."},{"issue":"1-2","key":"11_CR2","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1016\/S0304-3975(98)80007-8","volume":"200","author":"C. Blundo","year":"1998","unstructured":"C. Blundo, L.A. Frota Mattos, and D.R. Stinson. Generalized Beimel-Chor schemes for broadcast encryption and interactive key distribution. Theoretical Computer Science, 200(1-2):313\u2013334, 1998.","journal-title":"Theoretical Computer Science"},{"key":"11_CR3","doi-asserted-by":"crossref","DOI":"10.1201\/9781420049954","volume-title":"The CRC Handbook of Combinatorial Designs","author":"C.J. Colbourn","year":"1996","unstructured":"C.J. Colbourn and J.H. Dinitz. The CRC Handbook of Combinatorial Designs. CRC Press, Boca Raton, 1996."},{"key":"11_CR4","unstructured":"J.L. Cohen, M.H. Etzel, D.W. Faucher, and D.N. Heer. Security for broadband digital networks. Communications Technology, pages 58\u201369, August 1995."},{"key":"11_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/3-540-48658-5_25","volume-title":"Advances in Cryptology-CRYPTO\u201994","author":"B. Chor","year":"1994","unstructured":"B. Chor, A. Fiat, and M. Naor. Tracing traitors. In Yvo G. Desmedt, editor, Advances in Cryptology-CRYPTO\u201994, LNCS 839, pages 257\u2013270. Springer-Verlag, 1994."},{"issue":"4","key":"11_CR6","doi-asserted-by":"publisher","first-page":"634","DOI":"10.1145\/285055.285059","volume":"45","author":"U. Feige","year":"1998","unstructured":"U. Feige. A threshold of ln n for approximating set cover. J. ACM, 45(4): 634\u2013652, July 1998.","journal-title":"J. ACM"},{"key":"11_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1007\/3-540-48329-2_40","volume-title":"Advances in Cryptology-CRYPTO\u201993","author":"A. Fiat","year":"1994","unstructured":"A. Fiat and M. Naor. Broadcast encryption. In Advances in Cryptology-CRYPTO\u201993, LNCS 773, pages 480\u2013491. Springer-Verlag, 1994."},{"key":"11_CR8","unstructured":"Gemplus: Catalog of products and services. \n                    http:\/\/www.gemplus.com\/global offer\/index.htm\n                    \n                  , 1998."},{"key":"11_CR9","volume-title":"Computers and Intractability: A Guide to the Theory of NP-Completeness","author":"M.R. Garey","year":"1979","unstructured":"M.R. Garey and D.S. Johnson. Computers and Intractability: A Guide to the Theory of NP-Completeness. Freeman, San Francisco, 1979."},{"issue":"1","key":"11_CR10","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/S0377-2217(96)00161-0","volume":"101","author":"T. Grossman","year":"1997","unstructured":"T. Grossman and A. Wool. Computational experience with approximation algorithms for the set covering problem. Euro. J. Operational Research, 101(1):81\u201392, August 1997.","journal-title":"Euro. J. Operational Research"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"E. Gabber and A. Wool. How to prove where you are: Tracking the location of customer equipment. In Proc. 5th ACM Conf. Computer and Communications Security (CCS), pages 142\u2013149, San Francisco, November 1998.","DOI":"10.1145\/288090.288121"},{"key":"11_CR12","volume-title":"Approximation Algorithms for NP-Hard Problems","year":"1995","unstructured":"D.S. Hochbaum. (ed.) Approximation Algorithms for NP-Hard Problems. PWS Publishing Company, Boston, MA, 1995."},{"key":"11_CR13","unstructured":"R. Jain. The Art of Computer Systems Performance Analysis. John Wiley & Sons, 1991."},{"key":"11_CR14","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1016\/S0022-0000(74)80044-9","volume":"9","author":"D.S. Johnson","year":"1974","unstructured":"D.S. Johnson. Approximation algorithms for combinatorial problems. J. Computer System Sci., 9:256\u2013278, 1974.","journal-title":"J. Computer System Sci."},{"key":"11_CR15","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1016\/0012-365X(75)90058-8","volume":"13","author":"L. Lov\u00e1sz","year":"1975","unstructured":"L. Lov\u00e1sz. On the ratio of optimal integral and fractional covers. Disc. Math., 13:383\u2013390, 1975.","journal-title":"Disc. Math."},{"key":"11_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"512","DOI":"10.1007\/BFb0054150","volume-title":"Advances in Cryptology-EUROCRYPT\u201998","author":"M. Luby","year":"1998","unstructured":"M. Luby and J. Staddon. Combinatorial bounds for broadcast encryption. In K. Nyberg, editor, Advances in Cryptology-EUROCRYPT\u201998, LNCS 1403, pages 512\u2013526, Espoo, Finland, 1998. Springer-Verlag."},{"key":"11_CR17","volume-title":"European Scrambling Systems 5","author":"J. McCormac","year":"1996","unstructured":"J. McCormac. European Scrambling Systems 5. Waterford University Press, Waterford, Ireland, 1996."},{"key":"11_CR18","unstructured":"W.H. Mills and R.C. Mullin. Coverings and packings. In J.H. Dinitz and D.R. Stinson, editors, Contemporary Design Theory: A Collection of Surveys, pages 317\u2013399. John Wiley & Sons, 1992."},{"issue":"6","key":"11_CR19","doi-asserted-by":"publisher","first-page":"944","DOI":"10.1109\/5.387094","volume":"83","author":"B.M. Macq","year":"1995","unstructured":"B.M. Macq and J.-J. Quisquater. Cryptology for digital TV broadcasting. Proceedings of the IEEE, 83(6):944\u2013957, 1995.","journal-title":"Proceedings of the IEEE"},{"key":"11_CR20","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology-CRYPTO\u201998","author":"M. Naor","year":"1998","unstructured":"M. Naor and B. Pinkas. Threshold traitor tracing. In Advances in Cryptology-CRYPTO\u201998, LNCS 1462. Springer-Verlag, 1998."},{"key":"11_CR21","doi-asserted-by":"crossref","first-page":"1405","DOI":"10.2140\/pjm.1964.14.1405","volume":"14","author":"J. Sch\u00f6nheim","year":"1964","unstructured":"J. Sch\u00f6nheim. On coverings. Pacific J. Math., 14:1405\u20131411, 1964.","journal-title":"Pacific J. Math."},{"issue":"3","key":"11_CR22","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1023\/A:1008209004667","volume":"14","author":"D.R. Stinson","year":"1998","unstructured":"D.R. Stinson and T. van Trung. Some new results on key distribution patterns and broadcast encryption. Designs, Codes and Cryptography, 14(3):261\u2013279, 1998.","journal-title":"Designs, Codes and Cryptography"},{"key":"11_CR23","doi-asserted-by":"crossref","unstructured":"A. Wool. Key management for encrypted broadcast. In Proc. 5th ACM Conf. Computer and Communications Security (CCS), pages 7\u201316, San Francisco, November 1998.","DOI":"10.1145\/288090.288096"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48390-X_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T10:38:42Z","timestamp":1558262322000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48390-X_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540663621","9783540483908"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/3-540-48390-x_11","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1999]]},"assertion":[{"value":"30 August 1999","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}