Provably-secure time-bound hierarchical key assignment schemes

G Ateniese, A De Santis, AL Ferrara… - Proceedings of the 13th …, 2006 - dl.acm.org
A time-bound hierarchical key assignment scheme is a method to assign time-dependent
encryption keys to a set of classes in a partially ordered hierarchy, in such a way that the key …

Hierarchical and shared access control

A Castiglione, A De Santis, B Masucci… - IEEE Transactions …, 2015 - ieeexplore.ieee.org
Access control ensures that only the authorized users of a system are allowed to access
certain resources or tasks. Usually, according to their roles and responsibilities, users are …

Cryptographic hierarchical access control for dynamic structures

A Castiglione, A De Santis, B Masucci… - IEEE Transactions …, 2016 - ieeexplore.ieee.org
A hierarchical key assignment scheme is a method to assign some private information and
encryption keys to a set of classes in a partially ordered hierarchy, in such a way that the …

A higher-level security scheme for key access on cloud computing

B Celiktas, I Celikbilek, E Ozdemir - IEEE Access, 2021 - ieeexplore.ieee.org
In this work, we construct a key access management scheme that seamlessly transitions any
hierarchical-like access policy to the digital medium. The proposed scheme allows any …

Key indistinguishability versus strong key indistinguishability for hierarchical key assignment schemes

A Castiglione, A De Santis… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
A hierarchical key assignment scheme is a method to assign some private information and
encryption keys to a set of classes in a partially ordered hierarchy, in such a way that the …

Supporting dynamic updates in storage clouds with the Akl–Taylor scheme

A Castiglione, A De Santis, B Masucci, F Palmieri… - Information …, 2017 - Elsevier
With the wide diffusion of cloud technologies, an ever increasing amount of sensitive data is
moved on centralized network-based repository services, providing elastic outsourced …

A Hierarchical Key Assignment Scheme: A Unified Approach for Scalability and Efficiency

I Celikbilek, B Celiktas, E Ozdemir - IEEE Access, 2024 - ieeexplore.ieee.org
This study introduces a hierarchical key assignment scheme (HKAS) based on the closest
vector problem in an inner product space (CVP-IPS). The proposed scheme offers a …

Simple, efficient and strongly KI-secure hierarchical key assignment schemes

ESV Freire, KG Paterson, B Poettering - Cryptographers' Track at the RSA …, 2013 - Springer
Abstract Hierarchical Key Assignment Schemes can be used to enforce access control
policies by cryptographic means. In this paper, we present a new, enhanced security model …

Hierarchical and shared key assignment

A Castiglione, A De Santis… - 2014 17th International …, 2014 - ieeexplore.ieee.org
Access control ensures that only the authorized users of a system are allowed to access
certain resources or tasks. Usually, according to their powers and responsibilities, users are …

Hierarchical key assignment schemes with key rotation

R Cimorelli Belfiore, A De Santis, AL Ferrara… - Proceedings of the 29th …, 2024 - dl.acm.org
Hierarchical structures are frequently used to manage access to sensitive data in various
contexts, ranging from organizational settings to IoT networks. A Hierarchical Key …