Cryptographic key assignment schemes for any access control policy
From MaRDI portal
Publication:834941
DOI10.1016/J.IPL.2004.03.019zbMath1173.68509OpenAlexW2006440641MaRDI QIDQ834941
Anna Lisa Ferrara, Barbara Masucci, Alfredo De Santis
Publication date: 27 August 2009
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ipl.2004.03.019
Related Items (10)
Security and Tradeoffs of the Akl-Taylor Scheme and Its Variants ⋮ Provably-secure time-bound hierarchical key assignment schemes ⋮ An efficient solution for hierarchical access control problem in cloud environment ⋮ Access control in user hierarchy based on elliptic curve cryptosystem ⋮ Enforcing the security of a time-bound hierarchical key assignment scheme ⋮ Unconditionally secure key assignment schemes ⋮ Supporting dynamic updates in storage clouds with the Akl-Taylor scheme ⋮ On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures ⋮ Variations on a theme by Akl and Taylor: security and tradeoffs ⋮ Group Key Management: From a Non-hierarchical to a Hierarchical Structure
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A cryptographic key assignment scheme in a hierarchy for access control
- Cryptanalysis of YCN key assignment scheme in a hierarchy
- A dynamic cryptographic key assignment scheme in a tree structure
- Unconditionally secure key assignment schemes
- A method for obtaining digital signatures and public-key cryptosystems
- Theoretical Computer Science
This page was built for publication: Cryptographic key assignment schemes for any access control policy