메뉴 건너뛰기




Volumn 411, Issue 1, 2010, Pages 213-227

Variations on a theme by Akl and Taylor: Security and tradeoffs

Author keywords

Access control; Efficiency; Key assignment; Provable security

Indexed keywords

ASSIGNMENT STRATEGIES; CRYPTOGRAPHIC TECHNIQUES; DIFFERENT DOMAINS; EFFICIENCY REQUIREMENTS; HIERARCHICAL STRUCTURES; INDISTINGUISHABILITY; KEY ASSIGNMENT; KEY ASSIGNMENT SCHEMES; KEY RECOVERY; NEW RESULTS; PROVABLE SECURITY; PUBLIC INFORMATION; RIGOROUS ANALYSIS; TIME-DEPENDENT CONSTRAINTS;

EID: 71749111864     PISSN: 03043975     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.tcs.2009.09.028     Document Type: Article
Times cited : (31)

References (23)
  • 1
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • Akl S.G., and Taylor P.D. Cryptographic solution to a problem of access control in a hierarchy. ACM Trans. Comput. Syst. 1 3 (1983) 239-248
    • (1983) ACM Trans. Comput. Syst. , vol.1 , Issue.3 , pp. 239-248
    • Akl, S.G.1    Taylor, P.D.2
  • 2
    • 84958760029 scopus 로고    scopus 로고
    • A revocation scheme with minimal storage at receivers, advances in cryptology
    • T. Asano, A revocation scheme with minimal storage at receivers, advances in cryptology, in: Proc. of ASIACRYPT 2002, 2002, pp. 433-450
    • (2002) Proc. of ASIACRYPT , pp. 433-450
    • Asano, T.1
  • 3
    • 60349128962 scopus 로고    scopus 로고
    • Dynamic and efficient key management for access hierarchies
    • Article 18, Prelim. version in Proc. of ACM CCS 2005, 190-201
    • Atallah M.J., Blanton M., Fazio N., and Frikken K.B. Dynamic and efficient key management for access hierarchies. ACM Trans. Inf. Syst. Secur. 12 3 (2009) Article 18, Prelim. version in Proc. of ACM CCS 2005, 190-201
    • (2009) ACM Trans. Inf. Syst. Secur. , vol.12 , Issue.3
    • Atallah, M.J.1    Blanton, M.2    Fazio, N.3    Frikken, K.B.4
  • 6
    • 84954147732 scopus 로고    scopus 로고
    • Applying hierarchical and role-based access control to XML documents
    • J. Crampton, Applying hierarchical and role-based access control to XML documents, in Proc. of ACM SWS 2004, pp. 37-46
    • Proc. of ACM , vol.SWS 2004 , pp. 37-46
    • Crampton, J.1
  • 7
    • 5744237343 scopus 로고    scopus 로고
    • Cryptographic key assignment schemes for any access control policy
    • De Santis A., Ferrara A.L., and Masucci B. Cryptographic key assignment schemes for any access control policy. Inf. Proc. Lett. 92 4 (2004) 199-205
    • (2004) Inf. Proc. Lett. , vol.92 , Issue.4 , pp. 199-205
    • De Santis, A.1    Ferrara, A.L.2    Masucci, B.3
  • 8
    • 38049077460 scopus 로고    scopus 로고
    • Efficient provably-secure hierarchical key assignment schemes, Rep
    • at the IACR Cryptology ePrint Archive. Prelim. version in Proc. of MFCS
    • A. De Santis, A.L. Ferrara, B. Masucci, Efficient provably-secure hierarchical key assignment schemes, Rep. 2006/479 at the IACR Cryptology ePrint Archive. Prelim. version in Proc. of MFCS 2007, LNCS 4708, pp. 371-382
    • (2007) LNCS , vol.4708
    • De Santis, A.1    Ferrara, A.L.2    Masucci, B.3
  • 9
    • 0000857188 scopus 로고
    • On the normal number of prime factors of φ{symbol} (n)
    • Erdo{double acute}s P., and Pomerance C. On the normal number of prime factors of φ{symbol} (n). Rocky Mountain J. Math. 15 (1985) 343-352
    • (1985) Rocky Mountain J. Math. , vol.15 , pp. 343-352
    • Erdos, P.1    Pomerance, C.2
  • 11
    • 0024868772 scopus 로고    scopus 로고
    • A hard-core predicate for all one-way functions
    • O. Goldreich, L. Levin, A hard-core predicate for all one-way functions, in: Proc. of ACM STOC 1989, pp. 25-32
    • Proc. of ACM , vol.STOC 1989 , pp. 25-32
    • Goldreich, O.1    Levin, L.2
  • 14
    • 0000954459 scopus 로고
    • A cryptographic key generation scheme for multilevel data security
    • Harn L., and Lin H.Y. A cryptographic key generation scheme for multilevel data security. Comput. Security 9 6 (1990) 539-546
    • (1990) Comput. Security , vol.9 , Issue.6 , pp. 539-546
    • Harn, L.1    Lin, H.Y.2
  • 15
    • 0000564361 scopus 로고
    • A polynomial algorithm in linear programming
    • Khachiyan L. A polynomial algorithm in linear programming. Dokl. Akad. Nauk SSSR 24 (1979) 1093-1096
    • (1979) Dokl. Akad. Nauk SSSR , vol.24 , pp. 1093-1096
    • Khachiyan, L.1
  • 16
    • 2342477274 scopus 로고    scopus 로고
    • Efficient access control and key management schemes for mobile agents
    • Lin I.-C., Oub H.-H., and Hwang M.-S. Efficient access control and key management schemes for mobile agents. Comput. Stand. Interfaces 26 5 (2004) 423-433
    • (2004) Comput. Stand. Interfaces , vol.26 , Issue.5 , pp. 423-433
    • Lin, I.-C.1    Oub, H.-H.2    Hwang, M.-S.3
  • 17
    • 0022115074 scopus 로고
    • An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
    • MacKinnon S.J., Taylor P.D., Meijer H., and Akl S.G. An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Trans. Comput. C-34 9 (1985) 797-802
    • (1985) IEEE Trans. Comput. , vol.C-34 , Issue.9 , pp. 797-802
    • MacKinnon, S.J.1    Taylor, P.D.2    Meijer, H.3    Akl, S.G.4
  • 18
    • 0003614758 scopus 로고    scopus 로고
    • Digitalized Signatures and Public Key Functions as Intractable as Factorization
    • Tech. Rep. MIT/LCS/TR-212, MIT Lab. for Computer Science, 1979
    • M.O. Rabin, Digitalized Signatures and Public Key Functions as Intractable as Factorization, Tech. Rep. MIT/LCS/TR-212, MIT Lab. for Computer Science, 1979
    • Rabin, M.O.1
  • 19
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • Rivest R.L., Shamir A., and Adleman L. A method for obtaining digital signatures and public key cryptosystems. Commun. ACM 21 (1978) 120-126
    • (1978) Commun. ACM , vol.21 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 20
    • 38049015677 scopus 로고
    • On the generation of cryptographically strong pseudorandom sequences
    • Shamir A. On the generation of cryptographically strong pseudorandom sequences. ACM Trans. Comput. Syst. 1 (1983) 38-44
    • (1983) ACM Trans. Comput. Syst. , vol.1 , pp. 38-44
    • Shamir, A.1
  • 21
    • 34247380378 scopus 로고    scopus 로고
    • A secure system for data access based on anonymous and time-dependent hierarchical keys
    • W.-G. Tzeng, A secure system for data access based on anonymous and time-dependent hierarchical keys, in: Proc. of ACM ASIACCS 2006, pp. 223-230
    • (2006) Proc. of ACM ASIACCS , pp. 223-230
    • Tzeng, W.-G.1
  • 23
    • 32844471813 scopus 로고    scopus 로고
    • Merging: An efficient solution for a time-bound hierarchical key assignment scheme
    • Wang S.-Y., and Laih C.-S. Merging: An efficient solution for a time-bound hierarchical key assignment scheme. IEEE Trans. Dependable Secure Comput. 3 1 (2006)
    • (2006) IEEE Trans. Dependable Secure Comput. , vol.3 , Issue.1
    • Wang, S.-Y.1    Laih, C.-S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.