1. Huber, U., Sadeghi, A.R.: A generic transformation from symmetric to asymmetric broadcast encryption. Technical Report, Horst Görtz Institute for IT Security (2006), http://www.prosec.rub.de/publications
2. Wallner, D.M., Harder, E.J., Agee, R.C.: Key management for multicast: Issues and architectures. Request for comments (2627), Internet Engineering Task Force (IETF) (1999), URL: ftp.ietf.org/rfc/rfc2627.txt
3. 4C Entity, LLC: CPPM specification—introduction and common cryptographic elements. Specification Revision 1.0 (2003), URL: http://www.4centity.com/data/tech/spec/cppm-base100.pdf
4. AACS Licensing Administrator: Advanced access content system (AACS): Introduction and common cryptographic elements. Specification Revision 0.90 (2005), URL: http://www.aacsla.com/specifications/AACS_Spec-Common_0.90.pdf
5. Lecture Notes in Computer Science;D. Naor,2001