Unconditionally secure key assignment schemes
From MaRDI portal
Publication:2489918
DOI10.1016/J.DAM.2005.03.025zbMATH Open1091.94030OpenAlexW2073525935MaRDI QIDQ2489918FDOQ2489918
Authors: Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
Publication date: 28 April 2006
Published in: Discrete Applied Mathematics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.dam.2005.03.025
Recommendations
Measures of information, entropy (94A17) Graph theory (05C99) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- A linear algorithm for the domination number of a tree
- Title not available (Why is that?)
- Unconditionally secure key assignment schemes
- A dynamic cryptographic key assignment scheme in a tree structure
- Cryptographic key assignment schemes for any access control policy
- Cryptanalysis of YCN key assignment scheme in a hierarchy
- A cryptographic key assignment scheme in a hierarchy for access control
- An optimal algorithm to assign cryptographic keys in a tree structure for access control
- An improvement of a dynamic cryptographic key assignment scheme in a tree hierarchy
Cited In (11)
- An information-theoretic approach to the access control problem.
- Cryptographic key assignment schemes for any access control policy
- Unconditionally secure key assignment schemes
- A novel scheme for image encryption based on a synchronized coupled map
- Unconditionally secure revocable storage: tight bounds, optimal construction, and robustness
- On the relations between security notions in hierarchical key assignment schemes for dynamic structures
- Unconditional secure conference key distribution schemes with disenrollment capability
- Chaotic trigonometric Haar wavelet with focus on image encryption
- Supporting dynamic updates in storage clouds with the Akl-Taylor scheme
- A generic algebraic model for the analysis of cryptographic-key assignment schemes
- On optimal cryptographic key derivation
This page was built for publication: Unconditionally secure key assignment schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2489918)