{"id":"https://openalex.org/W2001209661","doi":"https://doi.org/10.1109/icics.2011.6173546","title":"Design and implementation of Sub-Cover difference broadcast encryption algorithm","display_name":"Design and implementation of Sub-Cover difference broadcast encryption algorithm","publication_year":2011,"publication_date":"2011-12-01","ids":{"openalex":"https://openalex.org/W2001209661","doi":"https://doi.org/10.1109/icics.2011.6173546","mag":"2001209661"},"language":"en","primary_location":{"id":"doi:10.1109/icics.2011.6173546","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icics.2011.6173546","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 8th International Conference on Information, Communications &amp; Signal Processing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060989487","display_name":"Qingqing Yi","orcid":null},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Qingqing Yi","raw_affiliation_strings":["Department of Electrical & Computer Engineering, National University of Singapore, Singapore","Dept. of Electrical & Computer Engineering National University of Singapore"],"affiliations":[{"raw_affiliation_string":"Department of Electrical & Computer Engineering, National University of Singapore, Singapore","institution_ids":["https://openalex.org/I165932596"]},{"raw_affiliation_string":"Dept. of Electrical & Computer Engineering National University of Singapore","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071022377","display_name":"Huaqun Guo","orcid":"https://orcid.org/0000-0001-6753-6537"},"institutions":[{"id":"https://openalex.org/I3005327000","display_name":"Institute for Infocomm Research","ror":"https://ror.org/053rfa017","country_code":"SG","type":"facility","lineage":["https://openalex.org/I115228651","https://openalex.org/I3005327000","https://openalex.org/I91275662"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Huaqun Guo","raw_affiliation_strings":["Cryptography & Security Department, Institute for Infocomm Research, Singapore","Cryptography & Security Dept., Inst. for Infocomm Res., Singapore"],"affiliations":[{"raw_affiliation_string":"Cryptography & Security Department, Institute for Infocomm Research, Singapore","institution_ids":["https://openalex.org/I3005327000"]},{"raw_affiliation_string":"Cryptography & Security Dept., Inst. for Infocomm Res., Singapore","institution_ids":["https://openalex.org/I3005327000"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089043394","display_name":"Wai\u2010Choong Wong","orcid":"https://orcid.org/0000-0001-6581-234X"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Wai-Choong Wong","raw_affiliation_strings":["Department of Electrical & Computer Engineering, National University of Singapore, Singapore","Dept. of Electrical & Computer Engineering National University of Singapore"],"affiliations":[{"raw_affiliation_string":"Department of Electrical & Computer Engineering, National University of Singapore, Singapore","institution_ids":["https://openalex.org/I165932596"]},{"raw_affiliation_string":"Dept. of Electrical & Computer Engineering National University of Singapore","institution_ids":["https://openalex.org/I165932596"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5060989487"],"corresponding_institution_ids":["https://openalex.org/I165932596"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.07706082,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2139","issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9921000003814697,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.973800003528595,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/broadcast-encryption","display_name":"Broadcast encryption","score":0.7502269744873047},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7492759227752686},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7423657178878784},{"id":"https://openalex.org/keywords/cover","display_name":"Cover (algebra)","score":0.5958554744720459},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5288675427436829},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.47317221760749817},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4672204256057739},{"id":"https://openalex.org/keywords/tree","display_name":"Tree (set theory)","score":0.4575061798095703},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.44890445470809937},{"id":"https://openalex.org/keywords/atomic-broadcast","display_name":"Atomic broadcast","score":0.43435797095298767},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.34002748131752014},{"id":"https://openalex.org/keywords/broadcasting","display_name":"Broadcasting (networking)","score":0.24998703598976135},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.22051730751991272},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1733875274658203},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.12530303001403809}],"concepts":[{"id":"https://openalex.org/C2778281673","wikidata":"https://www.wikidata.org/wiki/Q4972106","display_name":"Broadcast encryption","level":4,"score":0.7502269744873047},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7492759227752686},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7423657178878784},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.5958554744720459},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5288675427436829},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.47317221760749817},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4672204256057739},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.4575061798095703},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.44890445470809937},{"id":"https://openalex.org/C943373","wikidata":"https://www.wikidata.org/wiki/Q4817323","display_name":"Atomic broadcast","level":3,"score":0.43435797095298767},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.34002748131752014},{"id":"https://openalex.org/C110157686","wikidata":"https://www.wikidata.org/wiki/Q922122","display_name":"Broadcasting (networking)","level":2,"score":0.24998703598976135},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.22051730751991272},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1733875274658203},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.12530303001403809},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/icics.2011.6173546","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icics.2011.6173546","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 8th International Conference on Information, Communications &amp; Signal Processing","raw_type":"proceedings-article"},{"id":"pmh:oai:scholarbank.nus.edu.sg:10635/83607","is_oa":false,"landing_page_url":"http://scholarbank.nus.edu.sg/handle/10635/83607","pdf_url":null,"source":{"id":"https://openalex.org/S7407052290","display_name":"National University of Singapore","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Scopus","raw_type":"Conference Paper"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":2,"referenced_works":["https://openalex.org/W1995233806","https://openalex.org/W2168571148"],"related_works":["https://openalex.org/W1571147132","https://openalex.org/W1985727224","https://openalex.org/W2914756988","https://openalex.org/W1785500772","https://openalex.org/W10407734","https://openalex.org/W2951908754","https://openalex.org/W2348242842","https://openalex.org/W1957399513","https://openalex.org/W2361484568","https://openalex.org/W2440763760"],"abstract_inverted_index":{"This":[0],"paper":[1,73],"first":[2],"presents":[3],"and":[4,15,24],"compares":[5],"three":[6],"major":[7],"broadcast":[8,49,81],"encryption":[9,82],"schemes:":[10],"Direct":[11],"Approach,":[12],"Matrix-based":[13],"Method":[14],"Tree-based":[16],"Scheme.":[17],"It":[18],"then":[19],"focuses":[20],"on":[21,78],"the":[22,34,54,63,75],"study":[23],"implementation":[25],"of":[26,47],"Subset-Cover":[27],"Difference":[28],"method,":[29],"which":[30],"is":[31],"adopted":[32],"by":[33,59],"widely":[35],"used":[36],"content":[37],"distribution":[38],"system":[39],"Advanced":[40],"Access":[41],"Content":[42],"System":[43],"(AACS).":[44],"The":[45],"essence":[46],"this":[48,72],"scheme":[50],"lies":[51],"in":[52,62],"deducing":[53],"correct":[55],"subset":[56],"difference":[57],"combination":[58],"only":[60],"taking":[61],"end":[64],"user":[65],"node":[66],"number":[67],"to":[68],"be":[69],"revoked.":[70],"Finally,":[71],"suggests":[74],"future":[76],"exploration":[77],"a":[79],"hybrid":[80],"method.":[83]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
