메뉴 건너뛰기




Volumn , Issue , 2007, Pages 133-138

New constructions for provably-secure time-bound hierarchical key assignment schemes

Author keywords

Access control; Key assignment; Provable security

Indexed keywords

COMPUTER PRIVACY; DATA STRUCTURES; HIERARCHICAL SYSTEMS; INFORMATION SYSTEMS; PUBLIC KEY CRYPTOGRAPHY;

EID: 34548050702     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1266840.1266861     Document Type: Conference Paper
Times cited : (23)

References (24)
  • 1
    • 84976752387 scopus 로고
    • Cryptographic Solution to a Problem of Access Control in a Hierarchy
    • S. G. Akl and P. D. Taylor, Cryptographic Solution to a Problem of Access Control in a Hierarchy, ACM Trans. on Comp. Sys., 1(3), 239-248, 1983.
    • (1983) ACM Trans. on Comp. Sys , vol.1 , Issue.3 , pp. 239-248
    • Akl, S.G.1    Taylor, P.D.2
  • 2
    • 0003535981 scopus 로고
    • Optimal Preprocessing for Answering On-line Product Queries
    • 71/87, Inst, of Comp. Science, Tel-Aviv Univ
    • N. Alon and B. Schieber, Optimal Preprocessing for Answering On-line Product Queries, Tech. Rep. TR 71/87, Inst, of Comp. Science, Tel-Aviv Univ., 1987.
    • (1987) Tech. Rep. TR
    • Alon, N.1    Schieber, B.2
  • 3
    • 33745793594 scopus 로고    scopus 로고
    • M. J. Atallah, M. Blanton, N. Fazio, and K. B. Frikken, Dynamic and Efficient Key Management for Access Hierarchies, CERIAS Tech. Rep. TR 2006-09, Purdue Univ. Prelim, version in Proc. of the 12th ACM Conf. on Computer and Communications Security - CCS 2005, 190-201.
    • M. J. Atallah, M. Blanton, N. Fazio, and K. B. Frikken, Dynamic and Efficient Key Management for Access Hierarchies, CERIAS Tech. Rep. TR 2006-09, Purdue Univ. Prelim, version in Proc. of the 12th ACM Conf. on Computer and Communications Security - CCS 2005, 190-201.
  • 5
    • 34547282859 scopus 로고    scopus 로고
    • G. Ateniese, A. De Santis, A. L. Ferrara, and B. Masucci, Provably-Secure Time-Bound Hierarchical Key Assignment Schemes, in Proc. of the 13th ACM Conf. on Computer and Communications Security - CCS 2006, 288-297. Full version available as Report 2006/225 at the IACR Cryptology ePrint Archive.
    • G. Ateniese, A. De Santis, A. L. Ferrara, and B. Masucci, Provably-Secure Time-Bound Hierarchical Key Assignment Schemes, in Proc. of the 13th ACM Conf. on Computer and Communications Security - CCS 2006, 288-297. Full version available as Report 2006/225 at the IACR Cryptology ePrint Archive.
  • 6
    • 34548018501 scopus 로고    scopus 로고
    • H. L. Bodlaender, G. Tel, and N. Santoro, Trade-offs in Non-reversing Diameter, Nordic J. on Comput., 1, 111-134, 1994.
    • H. L. Bodlaender, G. Tel, and N. Santoro, Trade-offs in Non-reversing Diameter, Nordic J. on Comput., 1, 111-134, 1994.
  • 7
    • 33745166648 scopus 로고    scopus 로고
    • Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
    • Proc. of Crypto
    • D. Boneh, C. Gentry, and B. Waters, Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys, in Proc. of Crypto 2005, LNCS, 3621, 258-275.
    • (2005) LNCS , vol.3621 , pp. 258-275
    • Boneh, D.1    Gentry, C.2    Waters, B.3
  • 8
    • 13844281059 scopus 로고    scopus 로고
    • Efficient Time-Bound Hierarchical Key Assignment Scheme
    • H. Y. Chien, Efficient Time-Bound Hierarchical Key Assignment Scheme, IEEE Trans. on Knowl. and Data Eng., 16(10), 1301-1034, 2004.
    • (2004) IEEE Trans. on Knowl. and Data Eng , vol.16 , Issue.10 , pp. 1301-1034
    • Chien, H.Y.1
  • 10
    • 33645890580 scopus 로고    scopus 로고
    • Enforcing the Security of a Time-Bound Hierarchical Key Assignment Scheme
    • A. De Santis, A. L. Ferrara, and B. Masucci, Enforcing the Security of a Time-Bound Hierarchical Key Assignment Scheme, Inf. Sci., 176(12), 1684-1694, 2006.
    • (2006) Inf. Sci , vol.176 , Issue.12 , pp. 1684-1694
    • De Santis, A.1    Ferrara, A.L.2    Masucci, B.3
  • 14
    • 0742285808 scopus 로고    scopus 로고
    • A New Cryptographic. Key Assignment Scheme with Time-Constraint Access Control in a Hierarchy, Comp
    • H. F. Huang and C. C. Chang, A New Cryptographic. Key Assignment Scheme with Time-Constraint Access Control in a Hierarchy, Comp. Standards & Interfaces 26, 159-166, 2004.
    • (2004) Standards & Interfaces , vol.26 , pp. 159-166
    • Huang, H.F.1    Chang, C.C.2
  • 15
    • 10044272348 scopus 로고    scopus 로고
    • Comments on a Cryptographic Key Assignment Scheme, Comp
    • Q. Tang and C. J. Mitchell, Comments on a Cryptographic Key Assignment Scheme, Comp. Standards & Interfaces, 27, 323-326, 2005.
    • (2005) Standards & Interfaces , vol.27 , pp. 323-326
    • Tang, Q.1    Mitchell, C.J.2
  • 16
    • 0016495233 scopus 로고
    • Efficiency of a Good but not Linear Set Union Algorithm
    • R. E. Tarjan, Efficiency of a Good but not Linear Set Union Algorithm, Journal of the ACM, 22, 215-225, 1975.
    • (1975) Journal of the ACM , vol.22 , pp. 215-225
    • Tarjan, R.E.1
  • 17
    • 34548045692 scopus 로고
    • Shortcutting Planar Digraphs
    • 93-60, August
    • M. Thorup, Shortcutting Planar Digraphs, DIMACS Tech. Rep. 93-60, August 1993.
    • (1993) DIMACS Tech. Rep
    • Thorup, M.1
  • 18
    • 0036187601 scopus 로고    scopus 로고
    • A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy
    • W.-G. Tzeng, A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy, IEEE Trans. on Knowl. and Data Eng., 14(1), 182-188, 2002.
    • (2002) IEEE Trans. on Knowl. and Data Eng , vol.14 , Issue.1 , pp. 182-188
    • Tzeng, W.-G.1
  • 21
    • 33745780944 scopus 로고    scopus 로고
    • An RSA-Based Time-Bound Hierarchical Key Assignment Scheme for Electronic Article Subscription
    • J. Yeh, An RSA-Based Time-Bound Hierarchical Key Assignment Scheme for Electronic Article Subscription, in Proc. of the ACM Int. Conf. on Inf. and Knowl. Management -CIKM 2005, 285-286.
    • (2005) Proc. of the ACM Int. Conf. on Inf. and Knowl. Management -CIKM , pp. 285-286
    • Yeh, J.1
  • 22
    • 33947655924 scopus 로고    scopus 로고
    • Security of Chien's Efficient Time-Bound Hierarchical Key Assignment Scheme
    • X. Yi, Security of Chien's Efficient Time-Bound Hierarchical Key Assignment Scheme, IEEE Trans. on Knowl. and Data Eng., 17(9), 1298-1299, 2005.
    • (2005) IEEE Trans. on Knowl. and Data Eng , vol.17 , Issue.9 , pp. 1298-1299
    • Yi, X.1
  • 23
    • 0041347682 scopus 로고    scopus 로고
    • Security of Tzeng's Time-Bound Key Assignment Scheme for Access Control in a Hierarchy
    • X. Yi and Y. Ye, Security of Tzeng's Time-Bound Key Assignment Scheme for Access Control in a Hierarchy, IEEE Trans. on Knowl. and Data Eng., 15(4), 1054 -1055, 2003.
    • (2003) IEEE Trans. on Knowl. and Data Eng , vol.15 , Issue.4 , pp. 1054-1055
    • Yi, X.1    Ye, Y.2
  • 24
    • 32844471813 scopus 로고    scopus 로고
    • S.-Y. Wang and C.-Laih, Merging: An Efficient Solution for a Time-Bound Hierarchical Key Assignment Scheme, IEEE Trans. on Dep. and Secure Coinput., 3(1), 2006.
    • S.-Y. Wang and C.-Laih, Merging: An Efficient Solution for a Time-Bound Hierarchical Key Assignment Scheme, IEEE Trans. on Dep. and Secure Coinput., 3(1), 2006.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.