How to use independent secret keys for secure broadcasting of common messages | IEEE Conference Publication | IEEE Xplore