Efficient provably-secure hierarchical key assignment schemes
From MaRDI portal
Publication:719310
DOI10.1016/J.TCS.2011.06.024zbMATH Open1236.94074OpenAlexW2036493810MaRDI QIDQ719310FDOQ719310
Authors: Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
Publication date: 10 October 2011
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2011.06.024
Recommendations
- Efficient Provably-Secure Hierarchical Key Assignment Schemes
- New constructions for provably-secure time-bound hierarchical key assignment schemes
- On the relations between security notions in hierarchical key assignment schemes for dynamic structures
- Coding and Cryptography
- Provably-secure time-bound hierarchical key assignment schemes
Cites Work
- Probabilistic encryption
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- The Transitive Reduction of a Directed Graph
- Partially Ordered Sets
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
- New constructions for provably-secure time-bound hierarchical key assignment schemes
- Computing on a free tree via complexity-preserving mappings
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Shortcutting Planar Digraphs
- Title not available (Why is that?)
- Variations on a theme by Akl and Taylor: security and tradeoffs
- A dynamic cryptographic key assignment scheme in a tree structure
- Characterization of security notions for probabilistic private-key encryption
- Efficient Provably-Secure Hierarchical Key Assignment Schemes
- Selecting cryptographic key sizes
- A cryptographic key assignment scheme in a hierarchy for access control
- Generic Transformation for Scalable Broadcast Encryption Schemes
Cited In (14)
- A model of hierarchical key assignment scheme
- New constructions for provably-secure time-bound hierarchical key assignment schemes
- A novel cryptographic key assignment scheme with ID-based access control in a hierachy
- Provably-secure time-bound hierarchical key assignment schemes
- Hierarchical key assignment with dynamic read-write privilege enforcement and extended KI-security
- Title not available (Why is that?)
- Auditable hierarchy-private public-key encryption
- Simple, efficient and strongly KI-secure hierarchical key assignment schemes
- On the relations between security notions in hierarchical key assignment schemes for dynamic structures
- A note on time-bound hierarchical key assignment schemes
- Supporting dynamic updates in storage clouds with the Akl-Taylor scheme
- Enforcing the security of a time-bound hierarchical key assignment scheme
- Provably Secure Key Assignment Schemes from Factoring
- Efficient Provably-Secure Hierarchical Key Assignment Schemes
This page was built for publication: Efficient provably-secure hierarchical key assignment schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q719310)