{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T22:51:34Z","timestamp":1762210294915},"reference-count":29,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2003,5,1]],"date-time":"2003-05-01T00:00:00Z","timestamp":1051747200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2013,8,22]],"date-time":"2013-08-22T00:00:00Z","timestamp":1377129600000},"content-version":"vor","delay-in-days":3766,"URL":"https:\/\/www.elsevier.com\/open-access\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Discrete Applied Mathematics"],"published-print":{"date-parts":[[2003,5]]},"DOI":"10.1016\/s0166-218x(02)00447-x","type":"journal-article","created":{"date-parts":[[2003,5,12]],"date-time":"2003-05-12T23:10:20Z","timestamp":1052781020000},"page":"223-238","source":"Crossref","is-referenced-by-count":13,"title":["Linear broadcast encryption schemes"],"prefix":"10.1016","volume":"128","author":[{"given":"Carles","family":"Padr\u00f3","sequence":"first","affiliation":[]},{"given":"Ignacio","family":"Gracia","sequence":"additional","affiliation":[]},{"given":"Sebasti\u00e0","family":"Mart\u0131\u0301n","sequence":"additional","affiliation":[]},{"given":"Paz","family":"Morillo","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0166-218X(02)00447-X_BIB1","doi-asserted-by":"crossref","unstructured":"A. Beimel, B. Chor, Interaction in key distribution schemes, Advances in Cryptology\u2014CRYPTO \u201993, Lecture Notes in Computer Science, Vol. 773, Springer, Berlin, 1994, pp. 444\u2013455.","DOI":"10.1007\/3-540-48329-2_38"},{"key":"10.1016\/S0166-218X(02)00447-X_BIB2","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1109\/18.481774","article-title":"Communication in key distribution schemes","volume":"42","author":"Beimel","year":"1996","journal-title":"IEEE Trans. Inform. Theory"},{"key":"10.1016\/S0166-218X(02)00447-X_BIB3","doi-asserted-by":"crossref","unstructured":"S. Berkovits, How to broadcast a secret, Advances in Cryptology\u2014EUROCRYPT \u201991, Lecture Notes in Computer Science, Vol. 547, Springer, Berlin, 1985, pp. 535\u2013541.","DOI":"10.1007\/3-540-46416-6_50"},{"key":"10.1016\/S0166-218X(02)00447-X_BIB4","doi-asserted-by":"crossref","unstructured":"R. Blom, An optimal class of symmetric key generation systems, Advances in Cryptology\u2014EUROCRYPT \u201984, Lecture Notes in Computer Science, Vol. 209, Springer, Berlin, 1985, pp. 335\u2013338.","DOI":"10.1007\/3-540-39757-4_22"},{"key":"10.1016\/S0166-218X(02)00447-X_BIB5","doi-asserted-by":"crossref","unstructured":"C. Blundo, A. Cresti, Space requirements for broadcast encryption, Advances in Cryptology\u2014EUROCRYPT \u201994, Lecture Notes in Computer Science, Vol. 740, Springer, Berlin, 1995, pp. 287\u2013298.","DOI":"10.1007\/BFb0053444"},{"key":"10.1016\/S0166-218X(02)00447-X_BIB6","doi-asserted-by":"crossref","unstructured":"C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro, M. Yung, Perfectly secure key distribution for dynamic conferences, Inform. and Comput. 146 (1998) 1\u201323. (A previous version appeared in Advances in Cryptology\u2014CRYPTO \u201992, Lecture Notes in Computer Science, Vol. 740, Springer, Berlin, 1993, pp. 471\u2013486.)","DOI":"10.1006\/inco.1998.2717"},{"key":"10.1016\/S0166-218X(02)00447-X_BIB7","doi-asserted-by":"crossref","unstructured":"C. Blundo, A. De Santis, U. Vaccaro, Randomness in distribution protocols, Automata, Languages and Programming\u2014ICALP \u201994, Lecture Notes in Computer Science, Vol. 820, Springer, Berlin, 1994, pp. 568\u2013579.","DOI":"10.1007\/3-540-58201-0_99"},{"key":"10.1016\/S0166-218X(02)00447-X_BIB8","doi-asserted-by":"crossref","first-page":"309","DOI":"10.3233\/JCS-1994\/1995-3406","article-title":"Multiple key distribution mantaining user anonimity via broadcast channels","volume":"3","author":"Blundo","year":"1994","journal-title":"J. Comput. Security"},{"key":"10.1016\/S0166-218X(02)00447-X_BIB9","unstructured":"C. Blundo, L.A. Frota Mattos, D.R. Stinson, Trade-offs between communication and storage in unconditionally secure schemes for broadcast encryption and interactive key distribution, Advances in Cryptology\u2014CRYPTO\u201996, Lecture Notes in Computer Science, Vol. 1109, Springer, Berlin, 1996, pp. 387\u2013400."},{"key":"10.1016\/S0166-218X(02)00447-X_BIB10","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1007\/BF00191355","article-title":"On key storage in secure networks","volume":"8","author":"Dyer","year":"1995","journal-title":"J. Cryptology"},{"key":"10.1016\/S0166-218X(02)00447-X_BIB11","doi-asserted-by":"crossref","unstructured":"A. Fiat, M. Naor, Broadcast encryption. Advances in Cryptology\u2014CRYPTO\u201993, Lecture Notes in Computer Science, Vol. 773, Springer, Berlin, 1994, pp. 480\u2013491.","DOI":"10.1007\/3-540-48329-2_40"},{"key":"10.1016\/S0166-218X(02)00447-X_BIB12","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/BF02252869","article-title":"A matrix key-distribution scheme","volume":"2","author":"Gong","year":"1990","journal-title":"J. Cryptology"},{"key":"10.1016\/S0166-218X(02)00447-X_BIB13","doi-asserted-by":"crossref","unstructured":"M. Just, E. Kranakis, D. Krizanc, P. Van Oorschot, On key distribution via true broadcasting, Proceedings of the Second ACM Conference on Computer and Communications Security, pp. 81\u201388.","DOI":"10.1145\/191177.191195"},{"key":"10.1016\/S0166-218X(02)00447-X_BIB14","unstructured":"V. Korjik, M. Ivkov, Y. Merinovitch, A. Barg, H. van Tilborg, A broadcast key distribution scheme based on block designs, Cryptography and Coding V, Lecture Notes in Computer Science, Vol. 1025, Springer, Berlin, 1995, pp. 12\u201321."},{"key":"10.1016\/S0166-218X(02)00447-X_BIB15","doi-asserted-by":"crossref","unstructured":"K. Kurosawa, K. Okada, K. Sakano, Security of the center in key distribution schemes, Advances in Cryptology\u2014ASIACRYPT\u201994, Lecture Notes in Computer Science, Vol. 917, Springer, Berlin, 1995, pp. 333\u2013341.","DOI":"10.1007\/BFb0000445"},{"key":"10.1016\/S0166-218X(02)00447-X_BIB16","unstructured":"K. Kurosawa, T. Yoshida, Y. Desmedt, M. Burmester, Some bounds and a construction for secure broadcast encryption, Advances in Cryptology\u2014ASIACRYPT\u201998, Lecture Notes in Computer Science, Vol. 1514, Springer, Berlin, 1998, pp. 420\u2013433."},{"key":"10.1016\/S0166-218X(02)00447-X_BIB17","doi-asserted-by":"crossref","unstructured":"T. Leighton, S. Micali, Secret-key agreement without public key cryptography, Advances in Cryptology\u2014CRYPTO\u201993, Lecture Notes in Computer Science, Vol. 773, Springer, Berlin, 1994, pp. 456\u2013479.","DOI":"10.1007\/3-540-48329-2_39"},{"key":"10.1016\/S0166-218X(02)00447-X_BIB18","unstructured":"M. Luby, J. Staddon, Combinatorial bounds for broadcast encryption, Advances in Cryptology\u2014EUROCRYPT \u201998, Lecture Notes in Computer Science, Vol. 1403, Springer, Berlin, 1998, pp. 512\u2013527."},{"key":"10.1016\/S0166-218X(02)00447-X_BIB19","doi-asserted-by":"crossref","unstructured":"T. Matsumoto, Incidence structures for key sharing. Advances in Cryptology\u2014ASIACRYPT\u201994, Lecture Notes in Computer Science, Vol. 917, Springer, Berlin, 1995, pp. 342\u2013353.","DOI":"10.1007\/BFb0000446"},{"key":"10.1016\/S0166-218X(02)00447-X_BIB20","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/0166-218X(88)90068-6","article-title":"Key storage in secure networks","volume":"21","author":"Mitchell","year":"1998","journal-title":"Discrete Appl. Math."},{"key":"10.1016\/S0166-218X(02)00447-X_BIB21","first-page":"195","article-title":"Applications of finite geometries to information security","volume":"7","author":"O'Keefe","year":"1993","journal-title":"Austral. J. Combin."},{"key":"10.1016\/S0166-218X(02)00447-X_BIB22","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1023\/A:1014939630572","article-title":"Linear key predistribution schemes","volume":"25","author":"Padr\u00f3","year":"2002","journal-title":"Designs Codes Cryptography"},{"key":"10.1016\/S0166-218X(02)00447-X_BIB23","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1007\/BF01578871","article-title":"Some constructions for key distribution patterns","volume":"4","author":"Quinn","year":"1994","journal-title":"Designs Codes Cryptography"},{"key":"10.1016\/S0166-218X(02)00447-X_BIB24","doi-asserted-by":"crossref","unstructured":"G. S\u00e1ez, Generation of key predistribution schemes using secret sharing schemes, Proceedings of the International Workshop on Coding and Cryptography WCC 2001, Paris, France, 2001, pp. 435\u2013444.","DOI":"10.1016\/S1571-0653(04)00173-8"},{"key":"10.1016\/S0166-218X(02)00447-X_BIB25","series-title":"Cryptography: Theory and Practice","author":"Stinson","year":"1995"},{"key":"10.1016\/S0166-218X(02)00447-X_BIB26","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1023\/A:1008268610932","article-title":"On some methods for unconditionally secure key distribution and broadcast encryption","volume":"12","author":"Stinson","year":"1997","journal-title":"Designs Codes Cryptography"},{"key":"10.1016\/S0166-218X(02)00447-X_BIB27","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1023\/A:1008209004667","article-title":"Some new results on key distribution patterns and broadcast encryption","volume":"14","author":"Stinson","year":"1998","journal-title":"Designs Codes Cryptography"},{"key":"10.1016\/S0166-218X(02)00447-X_BIB28","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1016\/S0020-0190(98)00204-X","article-title":"An application of ramp schemes to broadcast encryption","volume":"69","author":"Stinson","year":"1999","journal-title":"Inform. Process. Lett."},{"key":"10.1016\/S0166-218X(02)00447-X_BIB29","series-title":"Codes and Cryptography","author":"Welsh","year":"1988"}],"container-title":["Discrete Applied Mathematics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0166218X0200447X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0166218X0200447X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,3,12]],"date-time":"2020-03-12T13:12:08Z","timestamp":1584018728000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0166218X0200447X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,5]]},"references-count":29,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2003,5]]}},"alternative-id":["S0166218X0200447X"],"URL":"https:\/\/doi.org\/10.1016\/s0166-218x(02)00447-x","relation":{},"ISSN":["0166-218X"],"issn-type":[{"value":"0166-218X","type":"print"}],"subject":[],"published":{"date-parts":[[2003,5]]}}}