Provably-secure time-bound hierarchical key assignment schemes
From MaRDI portal
Publication:431793
DOI10.1007/s00145-010-9094-6zbMath1278.94041OpenAlexW2018790170MaRDI QIDQ431793
Alfredo De Santis, Barbara Masucci, Anna Lisa Ferrara, Giuseppe Ateniese
Publication date: 3 July 2012
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-010-9094-6
bilinear mapskey recoveryaccess hierarchykey indistinguishabilitysecurity against adaptive adversariessecurity against static adversariessymmetric encryption schemetemporal constrainttime-bound hierarchical key assignment schemetime-dependent encryption keys
Related Items (9)
Tree-based cryptographic access control ⋮ Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness ⋮ Provably-secure time-bound hierarchical key assignment schemes ⋮ New constructions for provably-secure time-bound hierarchical key assignment schemes ⋮ Cryptographic Enforcement of Information Flow Policies Without Public Information ⋮ Supporting dynamic updates in storage clouds with the Akl-Taylor scheme ⋮ On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures ⋮ Cryptographically-enforced hierarchical access control with multiple keys ⋮ Variations on a theme by Akl and Taylor: security and tradeoffs
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Provably-secure time-bound hierarchical key assignment schemes
- Cryptographic key assignment schemes for any access control policy
- New constructions for provably-secure time-bound hierarchical key assignment schemes
- The average height of directed column-convex polyominoes having square, hexagonal and triangular cells
- Variations on a theme by Akl and Taylor: security and tradeoffs
- Probabilistic encryption
- Short signatures from the Weil pairing
- A dynamic cryptographic key assignment scheme in a tree structure
- Enforcing the security of a time-bound hierarchical key assignment scheme
- Characterization of security notions for probabilistic private-key encryption
- Number-theoretic constructions of efficient pseudo-random functions
- Keying Hash Functions for Message Authentication
- Efficient Provably-Secure Hierarchical Key Assignment Schemes
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- Identity-Based Encryption from the Weil Pairing
- Advances in Cryptology - EUROCRYPT 2004
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- The Transitive Reduction of a Directed Graph
This page was built for publication: Provably-secure time-bound hierarchical key assignment schemes