{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:17:22Z","timestamp":1761401842362},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319600796"},{"type":"electronic","value":"9783319600802"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-60080-2_16","type":"book-chapter","created":{"date-parts":[[2017,6,1]],"date-time":"2017-06-01T14:40:06Z","timestamp":1496328006000},"page":"200-214","source":"Crossref","is-referenced-by-count":4,"title":["Symmetric-Key Broadcast Encryption: The Multi-sender Case"],"prefix":"10.1007","author":[{"given":"Cody","family":"Freitag","sequence":"first","affiliation":[]},{"given":"Jonathan","family":"Katz","sequence":"additional","affiliation":[]},{"given":"Nathan","family":"Klein","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,2]]},"reference":[{"key":"16_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/BFb0055725","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201998","author":"W Aiello","year":"1998","unstructured":"Aiello, W., Lodha, S., Ostrovsky, R.: Fast digital identity revocation. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 137\u2013152. Springer, Heidelberg (1998). doi: 10.1007\/BFb0055725"},{"key":"16_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/978-3-540-68164-9_23","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2008","author":"P Austrin","year":"2008","unstructured":"Austrin, P., Kreitz, G.: Lower bounds for subset cover based broadcast encryption. In: Vaudenay, S. (ed.) AFRICACRYPT 2008. LNCS, vol. 5023, pp. 343\u2013356. Springer, Heidelberg (2008). doi: 10.1007\/978-3-540-68164-9_23"},{"key":"16_CR3","unstructured":"Balenson, D., McGrew, D., Sherman, A.: One-way function trees and amortized initialization. Internet Draft, Key management for large dynamic groups (1999)"},{"key":"16_CR4","unstructured":"Bhattacharjee, S., Sarkar, P.: Reducing communication overhead of the subset difference scheme. IEEE Trans. Comput, to appear. https:\/\/eprint.iacr.org\/2014\/577"},{"issue":"7","key":"16_CR5","doi-asserted-by":"crossref","first-page":"1709","DOI":"10.1109\/TC.2013.68","volume":"63","author":"S Bhattacherjee","year":"2014","unstructured":"Bhattacherjee, S., Sarkar, P.: Concrete analysis and trade-offs for the (complete tree) layered subset difference broadcast encryption scheme. IEEE Trans. Comput. 63(7), 1709\u20131722 (2014)","journal-title":"IEEE Trans. Comput."},{"key":"16_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/3-540-39757-4_22","volume-title":"Advances in Cryptology","author":"R Blom","year":"1985","unstructured":"Blom, R.: An optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335\u2013338. Springer, Heidelberg (1985). doi: 10.1007\/3-540-39757-4_22"},{"issue":"1","key":"16_CR7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1006\/inco.1998.2717","volume":"146","author":"C Blundo","year":"1998","unstructured":"Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly secure key distribution for dynamic conferences. Inf. Comput. 146(1), 1\u201323 (1998)","journal-title":"Inf. Comput."},{"key":"16_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/3-540-68697-5_29","volume-title":"Advances in Cryptology \u2014 CRYPTO 96","author":"C Blundo","year":"1996","unstructured":"Blundo, C., Mattos, L.A.F., Stinson, D.R.: Trade-offs between communication and storage in unconditionally secure schemes for broadcast encryption and interactive key distribution. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 387\u2013400. Springer, Heidelberg (1996). doi: 10.1007\/3-540-68697-5_29"},{"key":"16_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/11535218_16","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"D Boneh","year":"2005","unstructured":"Boneh, D., Gentry, C., Waters, B.: Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 258\u2013275. Springer, Heidelberg (2005). doi: 10.1007\/11535218_16"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Canetti, R., Garay, J.A., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast security: a taxonomy and some efficient constructions. In: IEEE INFOCOM, pp. 708\u2013716 (1999)","DOI":"10.1109\/INFCOM.1999.751457"},{"key":"16_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1007\/3-540-48910-X_32","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 99","author":"R Canetti","year":"1999","unstructured":"Canetti, R., Malkin, T., Nissim, K.: Efficient communication-storage tradeoffs for multicast encryption. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 459\u2013474. Springer, Heidelberg (1999). doi: 10.1007\/3-540-48910-X_32"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Cheon, J.H., Jho, N.-S., Kim, M.-H., Yoo, E.S.: Skipping, cascade, and combined chain schemes for broadcast encryption. IEEE Trans. Inf. Theor. 54(11), 5155\u20135171 (2008)","DOI":"10.1109\/TIT.2008.928959"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Dodis, Y., Fazio, N.: Public-key broadcast encryption for stateless receivers. In: Security and Privacy in Digital Rights Management (ACM CCS Workshop), pp. 61\u201380. ACM (2002)","DOI":"10.1007\/978-3-540-44993-5_5"},{"issue":"4","key":"16_CR14","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1007\/BF00191355","volume":"8","author":"M Dyer","year":"1995","unstructured":"Dyer, M., Fenner, T., Frieze, A., Thomason, A.: On key storage in secure networks. J. Cryptol. 8(4), 189\u2013200 (1995)","journal-title":"J. Cryptol."},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Erd\u00f6s, P., Frankl, P., F\u00fcredi, Z.: Families of finite sets in which no set is covered by the union of $$r$$ others. Israeli J. Math. 51(1\u20132), 79\u201389 (1985)","DOI":"10.1007\/BF02772959"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Fiat, A., Naor, M.: Broadcast encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 372\u2013387. Springer, Heidelberg (1994)","DOI":"10.1007\/3-540-48329-2_40"},{"key":"16_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1007\/3-540-48405-1_24","volume-title":"Advances in Cryptology \u2014 CRYPTO 99","author":"E Gafni","year":"1999","unstructured":"Gafni, E., Staddon, J., Yin, Y.L.: Efficient methods for integrating traceability and broadcast encryption. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 372\u2013387. Springer, Heidelberg (1999). doi: 10.1007\/3-540-48405-1_24"},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"Gentry, C., Ramzan, Z., Woodruff, D.P.: Explicit exclusive set systems with applications to broadcast encryption. In: 47th Annual Symposium on Foundations of Computer Science (FOCS), pp. 27\u201338. IEEE (2006)","DOI":"10.1109\/FOCS.2006.27"},{"key":"16_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1007\/978-3-540-28628-8_31","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"MT Goodrich","year":"2004","unstructured":"Goodrich, M.T., Sun, J.Z., Tamassia, R.: Efficient tree-based revocation in groups of low-state devices. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 511\u2013527. Springer, Heidelberg (2004). doi: 10.1007\/978-3-540-28628-8_31"},{"key":"16_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-45708-9_4","volume-title":"Advances in Cryptology \u2014 CRYPTO 2002","author":"D Halevy","year":"2002","unstructured":"Halevy, D., Shamir, A.: The LSD broadcast encryption scheme. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 47\u201360. Springer, Heidelberg (2002). doi: 10.1007\/3-540-45708-9_4"},{"key":"16_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1007\/11535218_17","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"JY Hwang","year":"2005","unstructured":"Hwang, J.Y., Lee, D.H., Lim, J.: Generic transformation for scalable broadcast encryption schemes. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 276\u2013292. Springer, Heidelberg (2005). doi: 10.1007\/11535218_17"},{"key":"16_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1007\/11426639_33","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"N-S Jho","year":"2005","unstructured":"Jho, N.-S., Hwang, J.Y., Cheon, J.H., Kim, M.-H., Lee, D.H., Yoo, E.S.: One-way chain based broadcast encryption schemes. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 559\u2013574. Springer, Heidelberg (2005). doi: 10.1007\/11426639_33"},{"issue":"4","key":"16_CR23","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1109\/TIT.1964.1053689","volume":"10","author":"WH Kautz","year":"1964","unstructured":"Kautz, W.H., Singleton, R.C.: Nonrandom binary superimposed codes. IEEE Trans. Inf. Theor. 10(4), 363\u2013377 (1964)","journal-title":"IEEE Trans. Inf. Theor."},{"key":"16_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1007\/3-540-48405-1_38","volume-title":"Advances in Cryptology \u2014 CRYPTO 99","author":"R Kumar","year":"1999","unstructured":"Kumar, R., Rajagopalan, S., Sahai, A.: Coding constructions for blacklisting problems without computational assumptions. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 609\u2013623. Springer, Heidelberg (1999). doi: 10.1007\/3-540-48405-1_38"},{"key":"16_CR25","unstructured":"Kumar, R., Russell, A.: A note on the set systems used for broadcast encryption. In: 14th Annual Symposium on Discrete Algorithms (SODA), pp. 470\u2013471. ACM-SIAM (2003)"},{"key":"16_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"512","DOI":"10.1007\/BFb0054150","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u201998","author":"M Luby","year":"1998","unstructured":"Luby, M., Staddon, J.: Combinatorial bounds for broadcast encryption. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 512\u2013526. Springer, Heidelberg (1998). doi: 10.1007\/BFb0054150"},{"key":"16_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-3-540-24676-3_10","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"D Micciancio","year":"2004","unstructured":"Micciancio, D., Panjwani, S.: Optimal communication complexity of generic multicast key distribution. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 153\u2013170. Springer, Heidelberg (2004). doi: 10.1007\/978-3-540-24676-3_10"},{"issue":"3","key":"16_CR28","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/0166-218X(88)90068-6","volume":"21","author":"CJ Mitchell","year":"1988","unstructured":"Mitchell, C.J., Piper, F.C.: Key storage in secure networks. Discrete Appl. Math. 21(3), 215\u2013228 (1988)","journal-title":"Discrete Appl. Math."},{"key":"16_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/3-540-44647-8_3","volume-title":"Advances in Cryptology \u2014 CRYPTO 2001","author":"D Naor","year":"2001","unstructured":"Naor, D., Naor, M., Lotspiech, J.: Revocation and tracing schemes for stateless receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 41\u201362. Springer, Heidelberg (2001). doi: 10.1007\/3-540-44647-8_3"},{"key":"16_CR30","doi-asserted-by":"crossref","unstructured":"Wallner, D.M., Harder, E.J., Agee, R.C.: Key management for multicast: issues and architectures. Internet Draft, RFC 2627 (1999)","DOI":"10.17487\/rfc2627"},{"issue":"8","key":"16_CR31","doi-asserted-by":"crossref","first-page":"1447","DOI":"10.1002\/sec.1093","volume":"8","author":"S-Y Wang","year":"2015","unstructured":"Wang, S.-Y., Yang, W.-C., Lin, Y.-J.: Balanced double subset difference broadcast encryption scheme. Secur. Commun. Netw. 8(8), 1447\u20131460 (2015)","journal-title":"Secur. Commun. Netw."},{"key":"16_CR32","doi-asserted-by":"crossref","unstructured":"Wong, C.K., Gouda, M., Lam, S.S.: Secure group communications using key graphs. In: Proceedings of ACM SIGCOMM, pp. 68\u201379 (1998)","DOI":"10.1145\/285237.285260"}],"container-title":["Lecture Notes in Computer Science","Cyber Security Cryptography and Machine Learning"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-60080-2_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T11:24:12Z","timestamp":1569410652000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-60080-2_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319600796","9783319600802"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-60080-2_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}