{"id":"https://openalex.org/W2038432476","doi":"https://doi.org/10.1109/glocomw.2011.6162525","title":"Matrix-tree based hybrid broadcast encryption","display_name":"Matrix-tree based hybrid broadcast encryption","publication_year":2011,"publication_date":"2011-12-01","ids":{"openalex":"https://openalex.org/W2038432476","doi":"https://doi.org/10.1109/glocomw.2011.6162525","mag":"2038432476"},"language":"en","primary_location":{"id":"doi:10.1109/glocomw.2011.6162525","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocomw.2011.6162525","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 IEEE GLOBECOM Workshops (GC Wkshps)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102008970","display_name":"Tao Li","orcid":"https://orcid.org/0000-0003-4564-5753"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Tao Li","raw_affiliation_strings":["School of Electrical & Electronic Engineering, Nanyang Technological University, Singapore","School of Electrical & Electronic Engineering , Nanyang Technological University , Singapore"],"affiliations":[{"raw_affiliation_string":"School of Electrical & Electronic Engineering, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]},{"raw_affiliation_string":"School of Electrical & Electronic Engineering , Nanyang Technological University , Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071022377","display_name":"Huaqun Guo","orcid":"https://orcid.org/0000-0001-6753-6537"},"institutions":[{"id":"https://openalex.org/I3005327000","display_name":"Institute for Infocomm Research","ror":"https://ror.org/053rfa017","country_code":"SG","type":"facility","lineage":["https://openalex.org/I115228651","https://openalex.org/I3005327000","https://openalex.org/I91275662"]},{"id":"https://openalex.org/I115228651","display_name":"Agency for Science, Technology and Research","ror":"https://ror.org/036wvzt09","country_code":"SG","type":"government","lineage":["https://openalex.org/I115228651"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Huaqun Guo","raw_affiliation_strings":["Cryptography & Security Department Institute for Infocomm Research, Agency for Science, Technology and Research, Singapore","Cryptography & Security Department, Institute for Infocomm Research, A\u2217STAR, Singapore"],"affiliations":[{"raw_affiliation_string":"Cryptography & Security Department Institute for Infocomm Research, Agency for Science, Technology and Research, Singapore","institution_ids":["https://openalex.org/I3005327000","https://openalex.org/I115228651"]},{"raw_affiliation_string":"Cryptography & Security Department, Institute for Infocomm Research, A\u2217STAR, Singapore","institution_ids":["https://openalex.org/I3005327000","https://openalex.org/I115228651"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071592220","display_name":"Maode Ma","orcid":"https://orcid.org/0000-0003-1438-7018"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Maode Ma","raw_affiliation_strings":["School of Electrical & Electronic Engineering, Nanyang Technological University, Singapore","School of Electrical & Electronic Engineering , Nanyang Technological University , Singapore"],"affiliations":[{"raw_affiliation_string":"School of Electrical & Electronic Engineering, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]},{"raw_affiliation_string":"School of Electrical & Electronic Engineering , Nanyang Technological University , Singapore","institution_ids":["https://openalex.org/I172675005"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5102008970"],"corresponding_institution_ids":["https://openalex.org/I172675005"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.10590069,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"61","last_page":"65"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9890000224113464,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/header","display_name":"Header","score":0.8999550342559814},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8070610761642456},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6957780718803406},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6476073265075684},{"id":"https://openalex.org/keywords/revocation","display_name":"Revocation","score":0.5957966446876526},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5876175165176392},{"id":"https://openalex.org/keywords/quality-of-service","display_name":"Quality of service","score":0.4930591285228729},{"id":"https://openalex.org/keywords/tree","display_name":"Tree (set theory)","score":0.4927535355091095},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.4518600404262543},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3721292316913605},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.29045265913009644},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08331036567687988},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07861176133155823}],"concepts":[{"id":"https://openalex.org/C48105269","wikidata":"https://www.wikidata.org/wiki/Q1141160","display_name":"Header","level":2,"score":0.8999550342559814},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8070610761642456},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6957780718803406},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6476073265075684},{"id":"https://openalex.org/C2775892892","wikidata":"https://www.wikidata.org/wiki/Q6509517","display_name":"Revocation","level":3,"score":0.5957966446876526},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5876175165176392},{"id":"https://openalex.org/C5119721","wikidata":"https://www.wikidata.org/wiki/Q220501","display_name":"Quality of service","level":2,"score":0.4930591285228729},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.4927535355091095},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.4518600404262543},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3721292316913605},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.29045265913009644},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08331036567687988},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07861176133155823},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/glocomw.2011.6162525","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocomw.2011.6162525","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 IEEE GLOBECOM Workshops (GC Wkshps)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.5299999713897705}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W97736718","https://openalex.org/W1995233806","https://openalex.org/W2168571148","https://openalex.org/W2914756988","https://openalex.org/W6721411451"],"related_works":["https://openalex.org/W2171597999","https://openalex.org/W17155033","https://openalex.org/W2600062742","https://openalex.org/W2189136227","https://openalex.org/W2321709401","https://openalex.org/W1866537546","https://openalex.org/W630850086","https://openalex.org/W2004104370","https://openalex.org/W3207760230","https://openalex.org/W1496222301"],"abstract_inverted_index":{"Broadcast":[0],"encryption":[1],"in":[2,53,79],"a":[3,9],"pay":[4],"television":[5],"system":[6],"is":[7,39,49],"actually":[8],"key":[10,15,90],"management":[11],"issue,":[12],"where":[13],"smaller":[14],"storage":[16,91],"and":[17,46,92,97],"shorter":[18],"header":[19],"length":[20],"are":[21,99],"required":[22],"to":[23,74,83,101],"assure":[24],"the":[25,40,47,50,68,71,76,80,85,88,103,106],"quality":[26],"of":[27,70,87,105],"service.":[28],"The":[29],"existing":[30],"solutions":[31],"come":[32],"up":[33],"with":[34],"two":[35,63,72],"typical":[36],"structures.":[37],"One":[38],"matrix-based":[41,81],"structure":[42,52,82],"without":[43],"revocation":[44,77],"capability":[45],"other":[48],"tree-based":[51],"Advanced":[54],"Access":[55],"Content":[56],"System.":[57],"In":[58],"this":[59],"paper,":[60],"we":[61],"propose":[62],"promising":[64],"schemes":[65],"that":[66],"exploit":[67],"combination":[69],"structures":[73],"solve":[75],"problem":[78],"meet":[84],"requirements":[86],"small":[89],"short":[93],"header.":[94],"Mathematical":[95],"derivations":[96],"calculations":[98],"performed":[100],"prove":[102],"feasibility":[104],"proposed":[107],"schemes.":[108]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
