{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T17:20:44Z","timestamp":1740158444680,"version":"3.37.3"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2016,9,28]],"date-time":"2016-09-28T00:00:00Z","timestamp":1475020800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1007\/s11432-014-0911-8","type":"journal-article","created":{"date-parts":[[2016,10,1]],"date-time":"2016-10-01T07:36:25Z","timestamp":1475307385000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An efficient protocol for secure multicast key distribution in the presence of adaptive adversaries","\u4e00\u79cd\u5feb\u901f\u6709\u6548\u80fd\u62b5\u6297\u81ea\u9002\u5e94\u653b\u51fb\u7684\u7ec4\u64ad\u5bc6\u94a5\u5206\u53d1\u534f\u8bae"],"prefix":"10.1007","volume":"60","author":[{"given":"Huafei","family":"Zhu","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,28]]},"reference":[{"key":"911_CR1","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1049\/iet-ifs.2009.0261","volume":"4","author":"P Sakarindr","year":"2010","unstructured":"Sakarindr P, Ansari N. Survey of security services on group communications. IET Inf Secur, 2010, 4: 258\u2013272","journal-title":"IET Inf Secur"},{"key":"911_CR2","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1007\/BFb0053443","volume-title":"Advances in Cryptology\u2014EUROCRYPT\u201994","author":"M Burmester","year":"1995","unstructured":"Burmester M, Desmedt Y. A secure and efficient conference key distribution system (extended abstract). In: Advances in Cryptology\u2014EUROCRYPT\u201994. Berlin: Springer, 1995. 275\u2013286"},{"key":"911_CR3","doi-asserted-by":"crossref","first-page":"905","DOI":"10.1109\/TC.2004.31","volume":"53","author":"Y Kim","year":"2004","unstructured":"Kim Y, Perrig A, Tsudik G. Group key agreement efficient in communication. IEEE Trans Comput, 2004, 53: 905\u2013921","journal-title":"IEEE Trans Comput"},{"key":"911_CR4","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1145\/984334.984337","volume":"7","author":"Y Kim","year":"2014","unstructured":"Kim Y, Perrig A, Tsudik G. Tree-based group key agreement. ACM Trans Inf Syst Secur, 2014, 7: 60\u201396","journal-title":"ACM Trans Inf Syst Secur"},{"key":"911_CR5","doi-asserted-by":"crossref","first-page":"621","DOI":"10.1109\/TNET.2012.2208201","volume":"21","author":"Q Wu","year":"2013","unstructured":"Wu Q, Qin B, Zhang L, et al. Fast transmission to remote cooperative groups: a new key management paradigm. IEEE\/ACM Trans Netw, 2013, 21: 621\u2013633","journal-title":"IEEE\/ACM Trans Netw"},{"key":"911_CR6","first-page":"480","volume-title":"Advances in Cryptology\u2014CRYPTO\u201993","author":"A Fiat","year":"1993","unstructured":"Fiat A, Naor M. Broadcast encryption. In: Advances in Cryptology\u2014CRYPTO\u201993. Berlin: Springer, 1993. 480\u2013491"},{"key":"911_CR7","first-page":"258","volume-title":"Advances in Cryptology\u2014CRYPTO","author":"D Boneh","year":"2005","unstructured":"Boneh D, Gentry C, Waters B. Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Advances in Cryptology\u2014CRYPTO. Berlin: Springer, 2005. 258\u2013275"},{"key":"911_CR8","first-page":"171","volume-title":"Advances in Cryptology\u2014EUROCRYPT","author":"C Gentry","year":"2009","unstructured":"Gentry C, Waters B. Adaptive security in broadcast encryption systems (with short ciphertexts). In: Advances in Cryptology\u2014EUROCRYPT. Berlin: Springer, 2009. 171\u2013188"},{"key":"911_CR9","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/s10207-013-0190-0","volume":"12","author":"D H Phan","year":"2013","unstructured":"Phan D H, Pointcheval D, Shahandashti S F, et al. Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts. Int J Inf Sec, 2013, 12: 251\u2013265","journal-title":"Int J Inf Sec"},{"key":"911_CR10","first-page":"68","volume-title":"Proceedings of the ACM SIGCOMM\u201998 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication","author":"C K Wong","year":"1998","unstructured":"Wong C K, Gouda M G, Lam S S. Secure group communications using key graphs. In: Proceedings of the ACM SIGCOMM\u201998 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication. New York: ACM, 1998. 68\u201379"},{"key":"911_CR11","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/90.836475","volume":"8","author":"C K Wong","year":"2000","unstructured":"Wong C K, Gouda M G, Lam S S. Secure group communications using key graphs. IEEE\/ACM Trans Netw, 2000, 8: 16\u201330","journal-title":"IEEE\/ACM Trans Netw"},{"key":"911_CR12","first-page":"459","volume-title":"Advances in Cryptology\u2014EUROCRYPT\u201999","author":"R Canetti","year":"1999","unstructured":"Canetti R, Malkin T, Nissim K. Efficient communication-storage tradeoffs for multicast encryption. In: Advances in Cryptology\u2014EUROCRYPT\u201999. Berlin: Springer, 1999. 459\u2013474"},{"key":"911_CR13","volume-title":"Key management for multicast: issues and architectures","author":"D M Wallner","year":"1999","unstructured":"Wallner D M, Harder E J, Agee R C. Key management for multicast: issues and architectures. National Security Agency, 1999. http:\/\/dx.doi.org\/10.17487\/RFC2627"},{"key":"911_CR14","doi-asserted-by":"crossref","first-page":"444","DOI":"10.1109\/TSE.2003.1199073","volume":"29","author":"A T Sherman","year":"2003","unstructured":"Sherman A T, McGrew D A. Key establishment in large dynamic groups using one-way function trees. IEEE Trans Softw Eng, 2003, 29: 444\u2013458","journal-title":"IEEE Trans Softw Eng"},{"key":"911_CR15","first-page":"243","volume-title":"Proceedings of the 22nd Annual Symposium on Principles of Distributed Computing","author":"J Goshi","year":"2003","unstructured":"Goshi J, Ladner R E. Algorithms for dynamic multicast key distribution trees. In: Proceedings of the 22nd Annual Symposium on Principles of Distributed Computing. New York: ACM, 2003. 243\u2013251"},{"key":"911_CR16","first-page":"511","volume-title":"Advances in Cryptology\u2014CRYPTO","author":"M T Goodrich","year":"2004","unstructured":"Goodrich M T, Sun J Z, Tamassia R. Efficient tree-based revocation in groups of low-state devices. In: Advances in Cryptology\u2014CRYPTO. Berlin: Springer, 2004. 511\u2013527"},{"key":"911_CR17","first-page":"241","volume-title":"Proceedings of IEEE Symposium on Security and Privacy, Okaland","author":"A Lysyanskaya","year":"2004","unstructured":"Lysyanskaya A, Tamassia R, Triandopoulos N. Multicast authentication in fully adversarial networks. In: Proceedings of IEEE Symposium on Security and Privacy, Okaland, 2004. 241\u2013255"},{"key":"911_CR18","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1145\/1030083.1030130","volume-title":"Proceedings of ACM Conference on Computer and Communications Security, Washington","author":"D Yao","year":"2004","unstructured":"Yao D, Fazio N, Dodis Y, et al. Id-based encryption for complex hierarchies with applications to forward security and broadcast encryption. In: Proceedings of ACM Conference on Computer and Communications Security, Washington, 2004. 354\u2013363"},{"key":"911_CR19","first-page":"42","volume-title":"Proceedings of the 1st Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, Boston","author":"S Zhu","year":"2004","unstructured":"Zhu S, Setia S, Xu S, et al. Gkmpan: an efficient group rekeying scheme for secure multicast in ad-hoc networks. In: Proceedings of the 1st Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, Boston, 2004. 42\u201351"},{"key":"911_CR20","doi-asserted-by":"crossref","first-page":"129","DOI":"10.3233\/JCS-2007-15106","volume":"15","author":"S Xu","year":"2007","unstructured":"Xu S. On the security of group communication schemes. J Comput Secur, 2007, 15: 129\u2013169","journal-title":"J Comput Secur"},{"key":"911_CR21","first-page":"1952","volume-title":"Proceedings of IEEE International Conference on Computer Communications, Shanghai","author":"Y R Chen","year":"2011","unstructured":"Chen Y R, Tygar J D, Tzeng W G. Secure group key management using uni-directional proxy re-encryption schemes. In: Proceedings of IEEE International Conference on Computer Communications, Shanghai, 2011. 1952\u20131960"},{"key":"911_CR22","first-page":"295","volume-title":"Proceedings of IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool","author":"Y R Chen","year":"2012","unstructured":"Chen Y R, Tzeng W G. Efficient and provably-secure group key management scheme using key derivation. In: Proceedings of IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, 2012. 295\u2013302"},{"key":"911_CR23","first-page":"918","volume-title":"Proceedings of ACM Conference on Computer and Communications Security, Raleigh","author":"V Cortier","year":"2012","unstructured":"Cortier V, Steel G, Wiedling C. Revoke and let live: a secure key revocation api for cryptographic devices. In: Proceedings of ACM Conference on Computer and Communications Security, Raleigh, 2012. 918\u2013928"},{"key":"911_CR24","doi-asserted-by":"crossref","first-page":"1949","DOI":"10.1145\/2480362.2480725","volume-title":"Proceedings of the 28th Annual ACM Symposium on Applied Computing. New York: ACM","author":"J H Cho","year":"2013","unstructured":"Cho J H, Chan K S, Chen I R. Composite trust-based public key management in mobile ad hoc networks. In: Proceedings of the 28th Annual ACM Symposium on Applied Computing. New York: ACM, 2013. 1949\u20131956"},{"key":"911_CR25","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1145\/2442116.2442123","volume":"12","author":"Q Dong","year":"2013","unstructured":"Dong Q, Liu D, Ning P. Providing dos resistance for signature-based broadcast authentication in sensor networks. ACM Trans Embedded Comput Syst, 2013, 12: 73","journal-title":"ACM Trans Embedded Comput Syst"},{"key":"911_CR26","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1145\/2431211.2431219","volume":"45","author":"T Koskela","year":"2013","unstructured":"Koskela T, Kassinen O, Harjula E, et al. P2P group management systems: a conceptual analysis. ACM Comput Surv, 2013, 45: 20","journal-title":"ACM Comput Surv"},{"key":"911_CR27","first-page":"327","volume-title":"Computer Security\u2014 ESORICS","author":"S K R Kremer","year":"2013","unstructured":"Kremer S, K\u00fcnnemann R, Steel G. Universally composable key-management. In: Computer Security\u2014 ESORICS. Berlin: Springer, 2013. 327\u2013344"},{"key":"911_CR28","first-page":"708","volume-title":"Proceedings of the 18th Annual Joint Conference of the IEEE Computer and Communications Societies, New York","author":"R Canetti","year":"1999","unstructured":"Canetti R, Garay J A, Itkis G, et al. Multicast security: a taxonomy and some efficient constructions. In: Proceedings of the 18th Annual Joint Conference of the IEEE Computer and Communications Societies, New York, 1999. 708\u2013716"},{"key":"911_CR29","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1007\/11787006_7","volume-title":"Automata, Languages and Programming","author":"D Micciancio","year":"2006","unstructured":"Micciancio D, Panjwani S. Corrupting one vs corrupting many: the case of broadcast and multicast encryption. In: Automata, Languages and Programming. Berlin: Springer, 2006. 70\u201382"},{"key":"911_CR30","first-page":"26","volume-title":"Advances in Cryptology\u2014CRYPTO\u201998","author":"M Bellare","year":"1998","unstructured":"Bellare M, Desai A, Pointcheval D, et al. Relations among notions of security for public-key encryption schemes. In: Advances in Cryptology\u2014CRYPTO\u201998. Berlin: Springer, 1998. 26\u201345"},{"key":"911_CR31","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.FIPS.197","volume-title":"Announcing the Advanced Encryption Standard (AES): Federal Information Processing Standards Publication 197","author":"National Institute of StandardsTechnology.","year":"2001","unstructured":"National Institute of Standards and Technology. Announcing the Advanced Encryption Standard (AES): Federal Information Processing Standards Publication 197. http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf. 2001"},{"key":"911_CR32","first-page":"264","volume-title":"Advances in Cryptology\u2014CRYPTO","author":"R Canetti","year":"2007","unstructured":"Canetti R, Rivest R L, Sudan M, et al. Amplifying collision resistance: a complexity-theoretic treatment. In: Advances in Cryptology\u2014CRYPTO. Berlin: Springer, 2007. 264\u2013283"},{"key":"911_CR33","first-page":"183","volume-title":"Advances in Cryptology\u2014CRYPTO","author":"D Aggarwal","year":"2014","unstructured":"Aggarwal D, Dodis Y, Jafargholi Z, et al. Amplifying privacy in privacy amplification. In: Advances in Cryptology\u2014CRYPTO. Berlin: Springer, 2014. 183\u2013198"},{"key":"911_CR34","doi-asserted-by":"crossref","first-page":"800","DOI":"10.1137\/120868414","volume":"43","author":"Y Dodis","year":"2014","unstructured":"Dodis Y, Li X, Wooley T D, et al. Privacy amplification and nonmalleable extractors via character sums. SIAM J Comput, 2014, 43: 800\u2013830","journal-title":"SIAM J Comput"},{"key":"911_CR35","first-page":"491","volume-title":"Proceedings of the 18th ACM Conference on Computer and Communications Security. New York: ACM","author":"S Halevi","year":"2011","unstructured":"Halevi S, Harnik D, Pinkas B, et al. Proofs of ownership in remote storage systems. In: Proceedings of the 18th ACM Conference on Computer and Communications Security. New York: ACM, 2011. 491\u2013500"},{"key":"911_CR36","first-page":"342","volume-title":"Advances in Cryptology\u2014 EUROCRYPT","author":"C Dwork","year":"2004","unstructured":"Dwork C, Naor M, Reingold O. Immunizing encryption schemes from decryption errors. In: Advances in Cryptology\u2014 EUROCRYPT. Berlin: Springer, 2004. 342\u2013360"},{"key":"911_CR37","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511721656","volume-title":"The Foundations of Cryptography: Volume 2, Basic Applications","author":"O Goldreich","year":"2004","unstructured":"Goldreich O. The Foundations of Cryptography: Volume 2, Basic Applications. Cambridge: Cambridge University Press, 2004"},{"key":"911_CR38","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511546891","volume-title":"The Foundations of Cryptography: Volume 1, Basic Techniques","author":"O Goldreich","year":"2001","unstructured":"Goldreich O. The Foundations of Cryptography: Volume 1, Basic Techniques. Cambridge: Cambridge University Press, 2001"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-014-0911-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-014-0911-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-014-0911-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,9]],"date-time":"2022-07-09T14:40:02Z","timestamp":1657377602000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-014-0911-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,28]]},"references-count":38,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2017,5]]}},"alternative-id":["911"],"URL":"https:\/\/doi.org\/10.1007\/s11432-014-0911-8","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"type":"print","value":"1674-733X"},{"type":"electronic","value":"1869-1919"}],"subject":[],"published":{"date-parts":[[2016,9,28]]},"article-number":"52109"}}