[1] Intel, Microsoft, Sony, et al. Advanced access content system (AACS)-introduction and common cryptographic elements [S]. Revision 0.95, 2009.
[2] Naor D, Naor M, Lotspiech J. Revocation and tracing schemes for stateless receivers [J].LNCS, Springer-Verlag, 2001, 2139: 41-62.
[3] Halevy D, Shamir A. The LSD broadcast encryption scheme [J]. LNCS, Springer-Verlag, 2002, 2442: 145-161.
[4] Austrin P, Kreitz G. Lower bounds for subset cover based broadcast encryption [J]. LNCS, Springer-Verlag, 2008, 5023: 343-356.
[5] Ak M, Kaya K, Onarlioglu K, et al. Efficient broadcast encryption with user profiles [J]. Information Sciences, 2010, 180(6):1060-1072.
[6] Martin T, Martin K M, Wild P. Establishing the broadcast efficiency of the subset difference revocation scheme Designs [J]. Codes and Cryptography, 2009, 51(3): 315-334.
[7] D’Arco P, Santis A D. Optimizing SD and LSD in presence of non-uniform probabilities of revocation [J]. LNCS, Springer-Verlag, 2009, 4883: 46-64.
[8] Nakamura Y, Kikuchi H. Efficient key management based on the subset difference method for secure group communication //Proceedings of 19th International Conference on Advanced Information Networking and Applications. Taipei, Taiwan, 2005:707-712.
|