Cryptographic key assignment schemes for any access control policy
From MaRDI portal
Publication:834941
DOI10.1016/J.IPL.2004.03.019zbMATH Open1173.68509OpenAlexW2006440641MaRDI QIDQ834941FDOQ834941
Authors: Anna Lisa Ferrara, Barbara Masucci, Alfredo De Santis
Publication date: 27 August 2009
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ipl.2004.03.019
Recommendations
- A cryptographic key assignment scheme in a hierarchy for access control
- A cryptographic key assignment scheme for access control in a hierarchy with exceptions
- Information Security
- Tolerant key assignment for enforcing complicated access control policies in a hierarchy
- Access control encryption for general policies from standard assumptions
- An efficient CCA-secure access control encryption for any policy
- A simple key assignment for access control based on polynomial
- Enforcing non-hierarchical access policies by hierarchical key assignment schemes
- Unconditionally secure key assignment schemes
Cites Work
- Title not available (Why is that?)
- A method for obtaining digital signatures and public-key cryptosystems
- Title not available (Why is that?)
- Title not available (Why is that?)
- Unconditionally secure key assignment schemes
- A dynamic cryptographic key assignment scheme in a tree structure
- Cryptanalysis of YCN key assignment scheme in a hierarchy
- A cryptographic key assignment scheme in a hierarchy for access control
- An information-theoretic approach to the access control problem.
Cited In (30)
- Access control in user hierarchy based on elliptic curve cryptosystem
- Enforcing non-hierarchical access policies by hierarchical key assignment schemes
- Optimizing segment based document protection
- Adaptive cryptographic access control. Foreword by Sylvia L. Osborn
- A novel cryptographic key assignment scheme with ID-based access control in a hierachy
- Tolerant key assignment for enforcing complicated access control policies in a hierarchy
- An information-theoretic approach to the access control problem.
- Provably-secure time-bound hierarchical key assignment schemes
- Cryptographically-enforced hierarchical access control with multiple keys
- Access Control Encryption for Equality, Comparison, and More
- An efficient CCA-secure access control encryption for any policy
- Access control in a hierarchy using a one-way trap door function
- Variations on a theme by Akl and Taylor: security and tradeoffs
- A simple key assignment for access control based on polynomial
- Unconditionally secure key assignment schemes
- Group Key Management: From a Non-hierarchical to a Hierarchical Structure
- Information Security
- Universally composable cryptographic role-based access control
- Simple, efficient and strongly KI-secure hierarchical key assignment schemes
- Cryptographic enforcement of information flow policies without public information
- On the relations between security notions in hierarchical key assignment schemes for dynamic structures
- A practical and dynamic key management scheme for a user hierarchy
- Time-storage trade-offs for cryptographically-enforced access control
- Supporting dynamic updates in storage clouds with the Akl-Taylor scheme
- A single-key access control scheme in information protection systems
- Enforcing the security of a time-bound hierarchical key assignment scheme
- Tree-based cryptographic access control
- A generic algebraic model for the analysis of cryptographic-key assignment schemes
- Security and Tradeoffs of the Akl-Taylor Scheme and Its Variants
- An efficient solution for hierarchical access control problem in cloud environment
This page was built for publication: Cryptographic key assignment schemes for any access control policy
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q834941)