Cryptanalysis of YCN key assignment scheme in a hierarchy
From MaRDI portal
Publication:1607030
DOI10.1016/S0020-0190(00)00013-2zbMath1014.68059OpenAlexW2077412394WikidataQ126621586 ScholiaQ126621586MaRDI QIDQ1607030
Publication date: 25 July 2002
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/s0020-0190(00)00013-2
Related Items (9)
Cryptographic key assignment schemes for any access control policy ⋮ A secure time-bound hierarchical key assignment scheme based on RSA public key cryptosystem ⋮ A simple key assignment for access control based on polynomial ⋮ A cryptographic key assignment scheme for access control in a hierarchy with exceptions ⋮ An efficient key assignment scheme for access control in a large leaf class hierarchy ⋮ Unconditionally secure key assignment schemes ⋮ Enforcing non-hierarchical access policies by hierarchical key assignment schemes ⋮ A NEW CONVERTIBLE AUTHENTICATED ENCRYPTION SCHEME BASED ON THE ELGAMAL CRYPTOSYSTEM ⋮ Modifying YCN key assignment scheme to resist the attack from Hwang
Cites Work
This page was built for publication: Cryptanalysis of YCN key assignment scheme in a hierarchy