1Abadi M,Rogaway P.Reconciling two views of cryptography (the computational soundness of formal encryption)[J].Journal of Cryptology,2002,15(2):103-127.
2Abadi M,Jurgens J.Formal eavesdropping and its computational interpretation[C]//LNCS 2215:Proceedings of the 4th International Symposium on the Theoretical Aspects of Computer Software,2001:82-94.
3Rafaeli S,Hutchinson D.A survey of key management for secure group communication[J].ACM Computing Survey,2003,35(3):309-329.
4Wong C K,Gouda M,Lam S S.Secure group communication using key graphs[J].IEEE/ACM Transactions on Networking,2000,8 (1):16-30.
5Goldwasser S,Micali S.Probabilistic encryption[J].Journal of computer and system science,1984,28(2):270-299.
6Mao Wenbo.Modern cryptography:theory and practice[M].Beijing:Publishing House of Electronics Industry,2004.
7Canetti R,Garay J,Itkis G,et al.Multicast security:taxonomy and some efficient constructions[C]//INFOCOM 1999.IEEE,1999,2:708-716.