1. Adelsbach A., Greveler U.: A broadcast encryption scheme with free-riders but unconditional security. In: Proceedings of the First International Conference on Digital Rights Management, Sydney 2005 (2006).
2. Asano T.: A revocation scheme with minimal storage at receivers. In: Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, Lecture Notes in Computer Science, vol. 2501, pp. 433–450 (2002).
3. Berkovits S.: How to broadcast a secret. In: Advances in Cryptology—CRYPTO ’91, Lecture Notes in Computer Science, vol. 547, pp. 536–541 (1991).
4. Chen W., Ge Z., Zhang C., Kurose J., Towsley D.: On dynamic sub-set difference revocation scheme. In: Networking 2004, Lecture Notes in Computer Science, vol. 3042, pp. 743–758 (2004).
5. Dodis Y., Fazio N.: Public key broadcast encryption for stateless receivers. In: ACM Workshop on Digital Rights Management, Lecture Notes in Computer Science, vol. 2696, pp. 61–80 (2002).