메뉴 건너뛰기




Volumn 412, Issue 41, 2011, Pages 5684-5699

Efficient provably-secure hierarchical key assignment schemes

Author keywords

Access control; Efficient key derivation; Key assignment; Provable security

Indexed keywords

BROADCAST ENCRYPTION SCHEMES; BUILDING BLOCKES; COMPUTATIONAL ASSUMPTIONS; DYNAMIC UPDATE; EFFICIENT KEY DERIVATION; ENCRYPTION KEY; HIERARCHICAL KEY ASSIGNMENT; INDISTINGUISHABILITY; KEY ASSIGNMENT; PRIVATE INFORMATION; PROVABLE SECURITY; PROVABLY SECURE; PUBLIC INFORMATION; PUBLIC KEYS; SYMMETRIC ENCRYPTION SCHEMES;

EID: 80052271043     PISSN: 03043975     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.tcs.2011.06.024     Document Type: Article
Times cited : (30)

References (34)
  • 2
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • S.G. Akl, and P.D. Taylor Cryptographic solution to a problem of access control in a hierarchy ACM Transactions on Computer Systems 1 3 1983 239 248
    • (1983) ACM Transactions on Computer Systems , vol.1 , Issue.3 , pp. 239-248
    • Akl, S.G.1    Taylor, P.D.2
  • 7
    • 84862218233 scopus 로고    scopus 로고
    • Provably-secure time-bound hierarchical key assignment schemes
    • 10.1007/s00145-010-9094-6 Preliminary version in Proc. of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, Virginia, USA, November 2006, pp. 288297
    • G. Ateniese, A. De Santis, A.L. Ferrara, and B. Masucci Provably-secure time-bound hierarchical key assignment schemes Journal of Cryptology 2011 10.1007/s00145-010-9094-6 Preliminary version in Proc. of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, Virginia, USA, November 2006, pp. 288297
    • (2011) Journal of Cryptology
    • Ateniese, G.1    De Santis, A.2    Ferrara, A.L.3    Masucci, B.4
  • 11
    • 24944562007 scopus 로고    scopus 로고
    • Hierarchical identity based encryption with constant size ciphertext
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • D. Boneh, X. Boyen, and E. Goh Hierarchical identity-based encryption with constant size ciphertexts Proc. of Advances in Cryptology, Eurocrypt 2005, Aarhus, Denmark, May 2005 Lecture Notes in Computer Science vol. 3494 2005 440 456 (Pubitemid 41313968)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 440-456
    • Boneh, D.1    Boyen, X.2    Goh, E.-J.3
  • 13
    • 52449148136 scopus 로고
    • Computing on a free tree via complexity-preserving mappings
    • B. Chazelle Computing on a free tree via complexity-preserving mappings Algorithmica 2 1987 337 361
    • (1987) Algorithmica , vol.2 , pp. 337-361
    • Chazelle, B.1
  • 14
    • 33947630349 scopus 로고    scopus 로고
    • On key assignment for hierarchical access control
    • DOI 10.1109/CSFW.2006.20, 1648711, Proceedings - 19th IEEE Computer Security Foundations Workshop, CSFW 2006
    • J. Crampton, K. Martin, P. Wild, On key assignment for hierarchical access control, in: Proc. of the 19th IEEE Computer Security Foundations Workshop, CSFW 2006, S. Servolo Island, Venice, Italy, July 2006, pp. 98111. (Pubitemid 46499720)
    • (2006) Proceedings of the Computer Security Foundations Workshop , vol.2006 , pp. 98-111
    • Crampton, J.1    Martin, K.2    Wild, P.3
  • 17
    • 53249115281 scopus 로고    scopus 로고
    • New constructions for provably-secure time-bound hierarchical key assignment schemes
    • A. De Santis, A.L. Ferrara, and B. Masucci New constructions for provably-secure time-bound hierarchical key assignment schemes Theoretical Computer Science 407 13 2008 213 230
    • (2008) Theoretical Computer Science , vol.407 , Issue.13 , pp. 213-230
    • De Santis, A.1    Ferrara, A.L.2    Masucci, B.3
  • 22
    • 0000954459 scopus 로고
    • A cryptographic key generation scheme for multilevel data security
    • L. Harn, and H.Y. Lin A cryptographic key generation scheme for multilevel data security Computers & Security 9 6 1990 539 546
    • (1990) Computers & Security , vol.9 , Issue.6 , pp. 539-546
    • Harn, L.1    Lin, H.Y.2
  • 24
    • 0031194544 scopus 로고    scopus 로고
    • A cryptographic key assignment scheme in a hierarchy for access control
    • M.S. Hwang A cryptographic key assignment scheme in a hierarchy for access control Mathematical and Computational Modeling 26 1 1997 27 31
    • (1997) Mathematical and Computational Modeling , vol.26 , Issue.1 , pp. 27-31
    • Hwang, M.S.1
  • 26
    • 0000653210 scopus 로고    scopus 로고
    • Selecting cryptographic key sizes
    • DOI 10.1007/s00145-001-0009-4
    • A.K. Lenstra, and E.R. Verheul Selecting cryptographic key sizes Journal of Cryptology 14 4 2001 255 293 (Pubitemid 33770276)
    • (2001) Journal of Cryptology , vol.14 , Issue.4 , pp. 255-293
    • Lenstra, A.K.1    Verheul, E.R.2
  • 27
    • 29644436249 scopus 로고    scopus 로고
    • Characterization of security notions for probabilistic private-key encryption
    • DOI 10.1007/s00145-005-0310-8
    • J. Katz, and M. Yung Characterization of security notions for probabilistic private-key encryption Journal of Cryptology 19 2006 67 95 (Pubitemid 43023011)
    • (2006) Journal of Cryptology , vol.19 , Issue.1 , pp. 67-95
    • Katz, J.1    Yung, M.2
  • 29
    • 0031344109 scopus 로고    scopus 로고
    • Dynamic key management schemes for access control in a hierarchy
    • C.H. Lin Dynamic key management schemes for access control in a hierarchy Computer Communications 20 1997 1381 1385
    • (1997) Computer Communications , vol.20 , pp. 1381-1385
    • Lin, C.H.1
  • 31
    • 0023962708 scopus 로고
    • Cryptographic implementation of a tree hierarchy for access control
    • R.S. Sandhu Cryptographic implementation of a tree hierarchy for access control Information Processing Letters 27 1988 95 98
    • (1988) Information Processing Letters , vol.27 , pp. 95-98
    • Sandhu, R.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.