Cryptographic key assignment schemes for any access control policy
From MaRDI portal
(Redirected from Publication:834941)
Recommendations
- A cryptographic key assignment scheme in a hierarchy for access control
- A cryptographic key assignment scheme for access control in a hierarchy with exceptions
- Information Security
- Tolerant key assignment for enforcing complicated access control policies in a hierarchy
- Access control encryption for general policies from standard assumptions
- An efficient CCA-secure access control encryption for any policy
- A simple key assignment for access control based on polynomial
- Enforcing non-hierarchical access policies by hierarchical key assignment schemes
- Unconditionally secure key assignment schemes
Cites work
- scientific article; zbMATH DE number 3657869 (Why is no real title available?)
- scientific article; zbMATH DE number 758277 (Why is no real title available?)
- scientific article; zbMATH DE number 918133 (Why is no real title available?)
- A cryptographic key assignment scheme in a hierarchy for access control
- A dynamic cryptographic key assignment scheme in a tree structure
- A method for obtaining digital signatures and public-key cryptosystems
- An information-theoretic approach to the access control problem.
- Cryptanalysis of YCN key assignment scheme in a hierarchy
- Unconditionally secure key assignment schemes
Cited in
(30)- Access control in user hierarchy based on elliptic curve cryptosystem
- Enforcing non-hierarchical access policies by hierarchical key assignment schemes
- Optimizing segment based document protection
- Adaptive cryptographic access control. Foreword by Sylvia L. Osborn
- A novel cryptographic key assignment scheme with ID-based access control in a hierachy
- Tolerant key assignment for enforcing complicated access control policies in a hierarchy
- Provably-secure time-bound hierarchical key assignment schemes
- An information-theoretic approach to the access control problem.
- Cryptographically-enforced hierarchical access control with multiple keys
- An efficient CCA-secure access control encryption for any policy
- Access Control Encryption for Equality, Comparison, and More
- Access control in a hierarchy using a one-way trap door function
- Variations on a theme by Akl and Taylor: security and tradeoffs
- A simple key assignment for access control based on polynomial
- Unconditionally secure key assignment schemes
- Group Key Management: From a Non-hierarchical to a Hierarchical Structure
- Information Security
- Universally composable cryptographic role-based access control
- Cryptographic enforcement of information flow policies without public information
- Simple, efficient and strongly KI-secure hierarchical key assignment schemes
- On the relations between security notions in hierarchical key assignment schemes for dynamic structures
- A practical and dynamic key management scheme for a user hierarchy
- Time-storage trade-offs for cryptographically-enforced access control
- Supporting dynamic updates in storage clouds with the Akl-Taylor scheme
- A single-key access control scheme in information protection systems
- Enforcing the security of a time-bound hierarchical key assignment scheme
- Tree-based cryptographic access control
- A generic algebraic model for the analysis of cryptographic-key assignment schemes
- Security and Tradeoffs of the Akl-Taylor Scheme and Its Variants
- An efficient solution for hierarchical access control problem in cloud environment
This page was built for publication: Cryptographic key assignment schemes for any access control policy
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q834941)