{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T14:54:06Z","timestamp":1753887246680,"version":"3.28.0"},"reference-count":37,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/itw.2003.1216720","type":"proceedings-article","created":{"date-parts":[[2004,3,2]],"date-time":"2004-03-02T02:26:50Z","timestamp":1078194410000},"page":"163-166","source":"Crossref","is-referenced-by-count":6,"title":["A flaw in a self-healing key distribution scheme"],"prefix":"10.1109","author":[{"given":"C.","family":"Blundo","sequence":"first","affiliation":[]},{"given":"P.","family":"D'Arco","sequence":"additional","affiliation":[]},{"given":"M.","family":"Listo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48892-8_12"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008209004667"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008268610932"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/18.915661"},{"key":"ref37","article-title":"Keystone: A Group Key Management Service","author":"wong","year":"2000","journal-title":"ICT International Conference on Telecommunications"},{"key":"ref36","article-title":"Key Management for Multicast: Issues and Architectures","author":"wallner","year":"0","journal-title":"Internet Draft (Draft-Wallner-Key-Arch-01 txt)"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0190(98)00204-X"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1137\/S0895480196304246"},{"key":"ref10","article-title":"Efficient Multicast Encryption Schemes","author":"di crescenzo","year":"2002","journal-title":"Security in Communication Network (SCN02) Lecture Notes in Computer Science"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/237814.237997"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48329-2_40"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-001-0006-7"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1007\/3-540-48405-1_24","article-title":"Efficient Methods for Integrating Traceability and Broadcast Encryption","volume":"1666","author":"gafni","year":"1999","journal-title":"Advances in Cryptology CRYPTO '99 Lecture Notes in Computer Science"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1007\/3-540-44598-6_21","article-title":"Long-Lived Broadcast Encryption","volume":"1880","author":"garay","year":"2000","journal-title":"Advances in Cryptology - CRYPTO 2000 Lecture Notes in Computer Science"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/3-540-45708-9_4","article-title":"The LSD Broadcast Encryption Scheme","volume":"2442","author":"halevy","year":"2002","journal-title":"Advances in Cryptology - Crypto '02 Lecture Notes in Computer Science"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46035-7_30"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_4"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"609","DOI":"10.1007\/3-540-48405-1_38","article-title":"Coding Constructions for Blacklisting Problems without Computational Assumptions","volume":"1666","author":"kumar","year":"1999","journal-title":"Advances in Cryptology CRYPTO '99 Lecture Notes in Computer Science"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1007\/3-540-44598-6_20","article-title":"Sequential Traitor Tracing","volume":"1880","author":"safavi-naini","year":"2000","journal-title":"Lecture Notes in Computer Science"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(98)80007-8"},{"key":"ref27","first-page":"228","article-title":"New Constructions for Multicast ReKeying Schemes Using Perfect Hash Families","author":"safavi-naini","year":"2000","journal-title":"7th ACM Conference on Computer and Communication Security"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0053444"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1007\/3-540-48910-X_32","article-title":"Efficient Communication-Storage Tradeoffs for Multicast Encryption","volume":"1592","author":"canetti","year":"1999","journal-title":"Advances in Cryptology - Eurocrypt '99 Lecture Notes in Computer Science"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004375"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1999.751457"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/18.841169"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46416-6_50"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36563-X_18"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1007\/978-3-540-48000-6_27","article-title":"A Quick Group Key Distribution Scheme with Entity Revocation","volume":"1716","author":"anzai","year":"0","journal-title":"Lecture Notes in Computer Science-Advance in Cryptology AsiaCrypt"},{"key":"ref20","article-title":"A Group Key Distribution Scheme with Decentralised User Join","author":"kurnio","year":"2002","journal-title":"Security in Communication Network (SCN02) Lecture Notes in Computer Science"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"512","DOI":"10.1007\/BFb0054150","article-title":"Combinatorial Bounds for Broadcast Encryption","volume":"1403","author":"luby","year":"1998","journal-title":"Advances in Cryptology - Eurocrypt '98 Lecture Notes in Computer Science"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45450-0_4"},{"key":"ref24","first-page":"1","article-title":"Efficient Trace and Revoke Schemes","volume":"1962","author":"naor","year":"2000","journal-title":"Financial Cryptography'2000 Lecture Notes in Computer Science"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/3-540-44647-8_3","article-title":"Revocation and Tracing Schemes for Stateless Receivers","volume":"2139","author":"naor","year":"2001","journal-title":"Advances in Cryptology - Crypto '01 Lecture Notes in Computer Science"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-61996-8_31"},{"key":"ref25","article-title":"ELK, a new Protocol for Efficient Large-Group Key Distribution","author":"perrig","year":"2000","journal-title":"IEEE Symposium on Security and Privacy"}],"event":{"name":"2003 IEEE Information Theory Workshop","acronym":"ITW-03","location":"Paris, France"},"container-title":["Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8588\/27226\/01216720.pdf?arnumber=1216720","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T04:04:49Z","timestamp":1497585889000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1216720\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/itw.2003.1216720","relation":{},"subject":[]}}