1999
DOI: 10.1007/3-540-48405-1_38
|View full text |Cite
|
Sign up to set email alerts
|

Coding Constructions for Blacklisting Problems without Computational Assumptions

Abstract: Abstract. We consider the broadcast exclusion problem: how to transmit a message over a broadcast channel shared by N = 2 n users so that all but some specified coalition of k excluded users can understand the contents of the message. Using error-correcting codes, and avoiding any computational assumptions in our constructions, we construct natural schemes that completely avoid any dependence on n in the transmission overhead. Specifically, we construct: (i) (for illustrative purposes,) a randomized scheme whe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
87
0

Year Published

2000
2000
2012
2012

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 127 publications
(87 citation statements)
references
References 22 publications
(43 reference statements)
0
87
0
Order By: Relevance
“…The idea above can be further extended to give a fully leakage resilient t-time signature scheme using cover-free families. We follow the definition of [20].…”
Section: A Fully Leakage-resilient One-time Signature Schemementioning
confidence: 99%
See 1 more Smart Citation
“…The idea above can be further extended to give a fully leakage resilient t-time signature scheme using cover-free families. We follow the definition of [20].…”
Section: A Fully Leakage-resilient One-time Signature Schemementioning
confidence: 99%
“…, S t ∈ S it holds that S \ ∪ t i=1 S i ≥ |S|/2. ♦ Kumar et al [20] show an explicit construction that, for any t and k, yields a (t, 1 2 )-cover free family S = {S 1 , . .…”
Section: A Fully Leakage-resilient One-time Signature Schemementioning
confidence: 99%
“…Kumar et al [13] proposed revocation methods using error correcting codes. In their methods only non-revoked receivers can correct the error in the broadcast message and retrieve the secret information.…”
Section: Related Workmentioning
confidence: 99%
“…The existence of such cover free subsets was proven by D'yachkov et al [14], where the fact that we can construct them in polynomial time was proven by Kumar et al [23].…”
Section: S(e|mentioning
confidence: 91%