Hierarchical key assignment with dynamic read-write privilege enforcement and extended KI-security
From MaRDI portal
Publication:6487202
DOI10.1007/978-3-319-61204-1_9zbMATH Open1521.94038MaRDI QIDQ6487202FDOQ6487202
Authors: Yi-Ruei Chen, Wen-Guey Tzeng
Publication date: 1 July 2022
Recommendations
- Simple, efficient and strongly KI-secure hierarchical key assignment schemes
- Supporting dynamic updates in storage clouds with the Akl-Taylor scheme
- Efficient Provably-Secure Hierarchical Key Assignment Schemes
- Efficient provably-secure hierarchical key assignment schemes
- Tolerant key assignment for enforcing complicated access control policies in a hierarchy
Cites Work
- Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
- Variations on a theme by Akl and Taylor: security and tradeoffs
- Efficient Provably-Secure Hierarchical Key Assignment Schemes
- Public Key Cryptography - PKC 2005
- Access control in user hierarchy based on elliptic curve cryptosystem
- Efficient provably-secure hierarchical key assignment schemes
- Low overhead broadcast encryption from multilinear maps
- Simple, efficient and strongly KI-secure hierarchical key assignment schemes
- Supporting dynamic updates in storage clouds with the Akl-Taylor scheme
- On the relations between security notions in hierarchical key assignment schemes for dynamic structures
- Achieving Simple, Secure and Efficient Hierarchical Access Control in Cloud Computing
- Provably Secure Key Assignment Schemes from Factoring
- Security and Tradeoffs of the Akl-Taylor Scheme and Its Variants
Cited In (2)
This page was built for publication: Hierarchical key assignment with dynamic read-write privilege enforcement and extended KI-security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6487202)