메뉴 건너뛰기




Volumn 7779 LNCS, Issue , 2013, Pages 101-114

Simple, efficient and strongly KI-secure hierarchical key assignment schemes

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL POLICIES; FORWARD-SECURE; HIERARCHICAL KEY ASSIGNMENT; KEY DERIVATIONS; PSEUDO-RANDOM FUNCTIONS; PSEUDORANDOM GENERATORS; SECURITY MODEL; STORAGE REQUIREMENTS;

EID: 84874338954     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-36095-4_7     Document Type: Conference Paper
Times cited : (30)

References (27)
  • 1
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • Akl, S.G., Taylor, P.D.: Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer Systems 1(3), 239-248 (1983)
    • (1983) ACM Transactions on Computer Systems , vol.1 , Issue.3 , pp. 239-248
    • Akl, S.G.1    Taylor, P.D.2
  • 2
    • 0022115074 scopus 로고
    • An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
    • MacKinnon, S.J., Taylor, P.D., Meijer, H., Akl, S.G.: An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Transactions on Computers 34(9), 797-802 (1985)
    • (1985) IEEE Transactions on Computers , vol.34 , Issue.9 , pp. 797-802
    • MacKinnon, S.J.1    Taylor, P.D.2    Meijer, H.3    Akl, S.G.4
  • 3
    • 0000954459 scopus 로고
    • A cryptographic key generation scheme for multilevel data security
    • Harn, L., Lin, H.Y.: A cryptographic key generation scheme for multilevel data security. Computers & Security 9(6), 539-546 (1990)
    • (1990) Computers & Security , vol.9 , Issue.6 , pp. 539-546
    • Harn, L.1    Lin, H.Y.2
  • 4
    • 0036396975 scopus 로고    scopus 로고
    • Hierarchical access control based on Chinese remainder theorem and symmetric algorithm
    • Chen, T.S., Chung, Y.F.: Hierarchical access control based on Chinese remainder theorem and symmetric algorithm. Computers & Security 21(6), 565-570 (2002)
    • (2002) Computers & Security , vol.21 , Issue.6 , pp. 565-570
    • Chen, T.S.1    Chung, Y.F.2
  • 5
    • 0036222059 scopus 로고    scopus 로고
    • A novel key management scheme based on discrete logarithms and polynomial interpolations
    • Shen, V., Chen, T.S.: A novel key management scheme based on discrete logarithms and polynomial interpolations. Computers & Security 21(2), 164-171 (2002)
    • (2002) Computers & Security , vol.21 , Issue.2 , pp. 164-171
    • Shen, V.1    Chen, T.S.2
  • 10
    • 34247380378 scopus 로고    scopus 로고
    • A secure system for data access based on anonymous authentication and time-dependent hierarchical keys
    • Tzeng, W.G.: A secure system for data access based on anonymous authentication and time-dependent hierarchical keys. In: ACM Symposium on Information, Computer and Communications Security, pp. 223-230 (2006)
    • (2006) ACM Symposium on Information, Computer and Communications Security , pp. 223-230
    • Tzeng, W.G.1
  • 11
    • 32844471813 scopus 로고    scopus 로고
    • An efficient solution for a time-bound hierarchical key assignment scheme
    • Wang, S.Y., Laih, C.S.: An efficient solution for a time-bound hierarchical key assignment scheme. IEEE Transactions on Dependable and Secure Computing 3(1), 91-100 (2006)
    • (2006) IEEE Transactions on Dependable and Secure Computing , vol.3 , Issue.1 , pp. 91-100
    • Wang, S.Y.1    Laih, C.S.2
  • 12
    • 38049077460 scopus 로고    scopus 로고
    • Efficient Provably-Secure Hierarchical Key Assignment Schemes
    • Kučera, L., Kučera, A. (eds.) MFCS 2007. Springer, Heidelberg
    • De Santis, A., Ferrara, A.L., Masucci, B.: Efficient Provably-Secure Hierarchical Key Assignment Schemes. In: Kučera, L., Kučera, A. (eds.) MFCS 2007. LNCS, vol. 4708, pp. 371-382. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4708 , pp. 371-382
    • De Santis, A.1    Ferrara, A.L.2    Masucci, B.3
  • 15
    • 77958469157 scopus 로고    scopus 로고
    • Constructing Key Assignment Schemes from Chain Partitions
    • Foresti, S., Jajodia, S. (eds.) Data and Applications Security and Privacy XXIV. Springer, Heidelberg
    • Crampton, J., Daud, R., Martin, K.M.: Constructing Key Assignment Schemes from Chain Partitions. In: Foresti, S., Jajodia, S. (eds.) Data and Applications Security and Privacy XXIV. LNCS, vol. 6166, pp. 130-145. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6166 , pp. 130-145
    • Crampton, J.1    Daud, R.2    Martin, K.M.3
  • 16
    • 79960205945 scopus 로고    scopus 로고
    • Provably Secure Key Assignment Schemes from Factoring
    • Parampalli, U., Hawkes, P. (eds.) ACISP 2011. Springer, Heidelberg
    • Freire, E.S.V., Paterson, K.G.: Provably Secure Key Assignment Schemes from Factoring. In: Parampalli, U., Hawkes, P. (eds.) ACISP 2011. LNCS, vol. 6812, pp. 292-309. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6812 , pp. 292-309
    • Freire, E.S.V.1    Paterson, K.G.2
  • 17
    • 84862218233 scopus 로고    scopus 로고
    • Provably-secure time-bound hierarchical key assignment schemes
    • Ateniese, G., De Santis, A., Ferrara, A.L., Masucci, B.: Provably-secure time-bound hierarchical key assignment schemes. J. Cryptology 25(2), 243-270 (2012)
    • (2012) J. Cryptology , vol.25 , Issue.2 , pp. 243-270
    • Ateniese, G.1    De Santis, A.2    Ferrara, A.L.3    Masucci, B.4
  • 19
    • 35048891868 scopus 로고    scopus 로고
    • Keying Hash Functions for Message Authentication
    • Advances in Cryptology - CRYPTO '96
    • Bellare, M., Canetti, R., Krawczyk, H.: Keying Hash Functions for Message Authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 1-15. Springer, Heidelberg (1996) (Pubitemid 126106226)
    • (1996) LECTURE NOTES in COMPUTER SCIENCE , Issue.1109 , pp. 1-15
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 20
    • 4243054954 scopus 로고    scopus 로고
    • Number-theoretic constructions of efficient pseudo-random functions
    • Naor, M., Reingold, O.: Number-theoretic constructions of efficient pseudo-random functions. J. ACM 51(2), 231-262 (2004)
    • (2004) J. ACM , vol.51 , Issue.2 , pp. 231-262
    • Naor, M.1    Reingold, O.2
  • 21
    • 0022716288 scopus 로고
    • A simple unpredictable pseudo-random number generator
    • Blum, L., Blum, M., Shub, M.: A simple unpredictable pseudo-random number generator. SIAM Journal on Computing 15(2), 364-383 (1986)
    • (1986) SIAM Journal on Computing , vol.15 , Issue.2 , pp. 364-383
    • Blum, L.1    Blum, M.2    Shub, M.3
  • 22
    • 84949995981 scopus 로고
    • An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information
    • Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. Springer, Heidelberg
    • Blum, M., Goldwasser, S.: An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 289-299. Springer, Heidelberg (1985)
    • (1985) LNCS , vol.196 , pp. 289-299
    • Blum, M.1    Goldwasser, S.2
  • 23
    • 35248891000 scopus 로고    scopus 로고
    • Forward-Security in Private-Key Cryptography
    • Joye, M. (ed.) CT-RSA 2003. Springer, Heidelberg
    • Bellare, M., Yee, B.S.: Forward-Security in Private-Key Cryptography. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 1-18. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2612 , pp. 1-18
    • Bellare, M.1    Yee, B.S.2
  • 25
    • 0001387789 scopus 로고
    • A decomposition theorem for partially ordered sets
    • Dilworth, R.P.: A decomposition theorem for partially ordered sets. Annals of Mathematics 51(1), 161-166 (1950)
    • (1950) Annals of Mathematics , vol.51 , Issue.1 , pp. 161-166
    • Dilworth, R.P.1
  • 26
    • 35048839833 scopus 로고    scopus 로고
    • Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes
    • Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
    • Dodis, Y., Gennaro, R., Håstad, J., Krawczyk, H., Rabin, T.: Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 494-510. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152 , pp. 494-510
    • Dodis, Y.1    Gennaro, R.2    Håstad, J.3    Krawczyk, H.4    Rabin, T.5
  • 27
    • 0022793132 scopus 로고
    • How to construct random functions
    • Goldreich, O., Goldwasser, S., Micali, S.: How to construct random functions. J. ACM 33(4), 792-807 (1986)
    • (1986) J. ACM , vol.33 , Issue.4 , pp. 792-807
    • Goldreich, O.1    Goldwasser, S.2    Micali, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.