메뉴 건너뛰기




Volumn 6812 LNCS, Issue , 2011, Pages 292-309

Provably secure key assignment schemes from factoring

Author keywords

access control; factoring; general poset; Key assignment scheme; provably secure

Indexed keywords

FACTORING; FACTORING INTEGERS; FIRST CONSTRUCTIONS; GENERAL POSET; INDISTINGUISHABILITY; KEY ASSIGNMENT SCHEMES; KEY RECOVERY ATTACKS; PROVABLY SECURE; SPECIAL FORMS; THE STANDARD MODEL;

EID: 79960205945     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-22497-3_19     Document Type: Conference Paper
Times cited : (17)

References (21)
  • 1
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • Akl, S.G., Taylor, P.D.: Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer Systems 1, 239-248 (1983)
    • (1983) ACM Transactions on Computer Systems , vol.1 , pp. 239-248
    • Akl, S.G.1    Taylor, P.D.2
  • 2
    • 0022115074 scopus 로고
    • An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
    • MacKinnon, S.J., Taylor, P.D., Meijer, H., Akl, S.G.: An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Transactions on Computers 34, 797-802 (1985)
    • (1985) IEEE Transactions on Computers , vol.34 , pp. 797-802
    • MacKinnon, S.J.1    Taylor, P.D.2    Meijer, H.3    Akl, S.G.4
  • 3
    • 0000954459 scopus 로고
    • A cryptographic key generation scheme for multilevel data security
    • Harn, L., Lin, H.Y.: A cryptographic key generation scheme for multilevel data security. Computers & Security 9, 539-546 (1990)
    • (1990) Computers & Security , vol.9 , pp. 539-546
    • Harn, L.1    Lin, H.Y.2
  • 6
    • 34247380378 scopus 로고    scopus 로고
    • A secure system for data access based on anonymous authentication and time-dependent hierarchical keys
    • Tzeng, W.G.: A secure system for data access based on anonymous authentication and time-dependent hierarchical keys. In: ACM Symposium on Information, Computer and Communications Security, pp. 223-230 (2006)
    • (2006) ACM Symposium on Information, Computer and Communications Security , pp. 223-230
    • Tzeng, W.G.1
  • 8
    • 0036396975 scopus 로고    scopus 로고
    • Hierarchical access control based on chinese remainder theorem and symmetric algorithm
    • Chen, T.S., Chung, Y.F.: Hierarchical access control based on chinese remainder theorem and symmetric algorithm. Computers & Security 21, 565-570 (2002)
    • (2002) Computers & Security , vol.21 , pp. 565-570
    • Chen, T.S.1    Chung, Y.F.2
  • 9
    • 0036222059 scopus 로고    scopus 로고
    • A novel key management scheme based on discrete logarithms and polynomial interpolations
    • Shen, V.R.L., Chen, T.S.: A novel key management scheme based on discrete logarithms and polynomial interpolations. Computers & Security 21, 164-171 (2002)
    • (2002) Computers & Security , vol.21 , pp. 164-171
    • Shen, V.R.L.1    Chen, T.S.2
  • 13
    • 77958469157 scopus 로고    scopus 로고
    • Constructing key assignment schemes from chain partitions
    • Foresti, S., Jajodia, S. (eds.) DBSec 2010. Springer, Heidelberg
    • Crampton, J., Daud, R., Martin, K.M.: Constructing key assignment schemes from chain partitions. In: Foresti, S., Jajodia, S. (eds.) DBSec 2010. LNCS, vol. 6166, pp. 130-145. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6166 , pp. 130-145
    • Crampton, J.1    Daud, R.2    Martin, K.M.3
  • 15
    • 0024868772 scopus 로고
    • A hard-core predicate for all one-way functions
    • Goldreich, O., Levin, L.A.: A hard-core predicate for all one-way functions. In: ACM STOC, pp. 25-32 (1989)
    • (1989) ACM STOC , pp. 25-32
    • Goldreich, O.1    Levin, L.A.2
  • 16
    • 0022793132 scopus 로고
    • How to construct random functions
    • Goldreich, O., Goldwasser, S., Micali, S.: How to construct random functions. J. ACM 33, 792-807 (1986)
    • (1986) J. ACM , vol.33 , pp. 792-807
    • Goldreich, O.1    Goldwasser, S.2    Micali, S.3
  • 17
    • 0001387789 scopus 로고
    • A decomposition theorem for partially ordered sets
    • Dilworth, R.P.: A decomposition theorem for partially ordered sets. Annals of Mathematics 51, 161-166 (1950)
    • (1950) Annals of Mathematics , vol.51 , pp. 161-166
    • Dilworth, R.P.1
  • 18
    • 67650677267 scopus 로고    scopus 로고
    • Practical chosen ciphertext secure encryption from factoring
    • Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
    • Hofheinz, D., Kiltz, E.: Practical chosen ciphertext secure encryption from factoring. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 313-332. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5479 , pp. 313-332
    • Hofheinz, D.1    Kiltz, E.2
  • 19
    • 0022716288 scopus 로고
    • A simple unpredictable pseudo-random number generator
    • Blum, L., Blum, M., Shub, M.: A simple unpredictable pseudo-random number generator. SIAM Journal on Computing 15(2), 364-383 (1986)
    • (1986) SIAM Journal on Computing , vol.15 , Issue.2 , pp. 364-383
    • Blum, L.1    Blum, M.2    Shub, M.3
  • 21
    • 85034622087 scopus 로고
    • Efficient and secure pseudo-random number generation
    • Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. Springer, Heidelberg
    • Vazirani, U.V., Vazirani, V.V.: Efficient and secure pseudo-random number generation. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 193-202. Springer, Heidelberg (1985)
    • (1985) LNCS , vol.196 , pp. 193-202
    • Vazirani, U.V.1    Vazirani, V.V.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.