@inproceedings{052eacf2a76e4f8ab9a33a46d87c81a8,
title = "The interval revocation scheme for broadcasting messages to stateless receivers",
abstract = "The Broadcast Encryption methods, often referred to as revocation schemes, allow data to be efficiently broadcast to a dynamically changing group of users. A special case is when the receivers are stateless [2,1]. Naor et al. [2] propose the Complete Subset Method (CSM) and the Subset Difference Method (SDM). Asano [1] puts forth two other methods, AM1 and AM2, which use public prime parameters to generate the decryption keys. The efficiency of broadcast encryption methods is measured by three parameters: (i) message size - the number of transmitted ciphertexts; (ii) storage at receiver - the number of private keys each receiver is required to store; and (iii) key derivation time - the computational overhead needed to access the decryption keys.",
author = "A. Zych and M. Petkovic and W. Jonker",
year = "2007",
doi = "10.1007/978-3-540-73538-0_8",
language = "English",
isbn = "978-3-540-73533-5",
series = "Lecture Notes in Computer Science",
publisher = "Springer",
pages = "95--97",
editor = "S. Barker and G.J. Ahn",
booktitle = "Proceedings of the 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security (Data and Applications Security XXI) 8-11 July 2007, Redondo Beach, California, USA",
address = "Germany",
note = "conference; Data and Applications Security XXI; 2007-07-08; 2007-07-11 ; Conference date: 08-07-2007 Through 11-07-2007",
}