Provably-Secure Time-Bound Hierarchical Key Assignment Schemes

被引:0
|
作者
Giuseppe Ateniese
Alfredo De Santis
Anna Lisa Ferrara
Barbara Masucci
机构
[1] The Johns Hopkins University,Dipartimento di Informatica ed Applicazioni
[2] Università di Salerno,undefined
来源
Journal of Cryptology | 2012年 / 25卷
关键词
Access control; Key assignment; Time-bound; Provable security; Efficiency;
D O I
暂无
中图分类号
学科分类号
摘要
A time-bound hierarchical key assignment scheme is a method to assign time-dependent encryption keys to a set of classes in a partially ordered hierarchy, in such a way that each class can compute the keys of all classes lower down in the hierarchy, according to temporal constraints.
引用
收藏
页码:243 / 270
页数:27
相关论文
共 50 条
  • [21] Applying Time-Bound Hierarchical Key Assignment in Wireless Sensor Networks
    Zhu, Wen Tao
    Deng, Robert H.
    Zhou, Jianying
    Bao, Feng
    INFORMATION AND COMMUNICATIONS SECURITY, 2011, 7043 : 306 - +
  • [22] An efficient time-bound hierarchical key management scheme for secure broadcasting
    Bertino, Elisa
    Shang, Ning
    Wagstaff, Samuel S., Jr.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2008, 5 (02) : 65 - 70
  • [23] A Time-Bound and Hierarchical Key Management Scheme for Secure Multicast Systems
    Shen, Victor R. L.
    Huang, Wei-Chieh
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 85 (04) : 1741 - 1764
  • [24] Merging: An efficient solution for a time-bound hierarchical key assignment scheme
    Wang, SY
    Laih, CS
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2006, 3 (01) : 91 - 100
  • [25] Provably Secure Key Assignment Schemes from Factoring
    Freire, Eduarda S. V.
    Paterson, Kenneth G.
    INFORMATION SECURITY AND PRIVACY, 2011, 6812 : 292 - 309
  • [26] Security of Chien's efficient time-bound hierarchical key assignment scheme
    Yi, X
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2005, 17 (09) : 1298 - 1299
  • [27] A SECURE TIME-BOUND HIERARCHICAL KEY MANAGEMENT SCHEME BASED ON ECC FOR MOBILE AGENTS
    Huang, Jen-Yan
    Chung, Yu-Fang
    Chen, Tzer-Shyong
    Liao, I-En
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2010, 6 (05): : 2159 - 2170
  • [28] On session key construction in provably-secure key establishment protocols
    Choo, KKR
    Boyd, C
    Hitchcock, Y
    PROGRESS IN CRYPTOLOGY - MYCRYPT 2005, 2005, 3715 : 116 - 131
  • [29] Provably-secure schemes for basic query support in outsourced databases
    Amanatidis, Georgios
    Boldyreva, Alexandra
    O'Neill, Adam
    DATA AND APPLICATIONS SECURITY XXI, PROCEEDINGS, 2007, 4602 : 14 - +
  • [30] A time-bound key management scheme for hierarchical tree
    Liu, Jiqiang
    Zhong, Sheng
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 445 - +