Provably-secure time-bound hierarchical key assignment schemes
A time-bound hierarchical key assignment scheme is a method to assign time-dependent
encryption keys to a set of classes in a partially ordered hierarchy, in such a way that the key …
encryption keys to a set of classes in a partially ordered hierarchy, in such a way that the key …
Hierarchical and shared access control
Access control ensures that only the authorized users of a system are allowed to access
certain resources or tasks. Usually, according to their roles and responsibilities, users are …
certain resources or tasks. Usually, according to their roles and responsibilities, users are …
Cryptographic hierarchical access control for dynamic structures
A hierarchical key assignment scheme is a method to assign some private information and
encryption keys to a set of classes in a partially ordered hierarchy, in such a way that the …
encryption keys to a set of classes in a partially ordered hierarchy, in such a way that the …
A higher-level security scheme for key access on cloud computing
In this work, we construct a key access management scheme that seamlessly transitions any
hierarchical-like access policy to the digital medium. The proposed scheme allows any …
hierarchical-like access policy to the digital medium. The proposed scheme allows any …
Key indistinguishability versus strong key indistinguishability for hierarchical key assignment schemes
A Castiglione, A De Santis… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
A hierarchical key assignment scheme is a method to assign some private information and
encryption keys to a set of classes in a partially ordered hierarchy, in such a way that the …
encryption keys to a set of classes in a partially ordered hierarchy, in such a way that the …
Supporting dynamic updates in storage clouds with the Akl–Taylor scheme
With the wide diffusion of cloud technologies, an ever increasing amount of sensitive data is
moved on centralized network-based repository services, providing elastic outsourced …
moved on centralized network-based repository services, providing elastic outsourced …
A Hierarchical Key Assignment Scheme: A Unified Approach for Scalability and Efficiency
This study introduces a hierarchical key assignment scheme (HKAS) based on the closest
vector problem in an inner product space (CVP-IPS). The proposed scheme offers a …
vector problem in an inner product space (CVP-IPS). The proposed scheme offers a …
Simple, efficient and strongly KI-secure hierarchical key assignment schemes
ESV Freire, KG Paterson, B Poettering - Cryptographers' Track at the RSA …, 2013 - Springer
Abstract Hierarchical Key Assignment Schemes can be used to enforce access control
policies by cryptographic means. In this paper, we present a new, enhanced security model …
policies by cryptographic means. In this paper, we present a new, enhanced security model …
Hierarchical and shared key assignment
A Castiglione, A De Santis… - 2014 17th International …, 2014 - ieeexplore.ieee.org
Access control ensures that only the authorized users of a system are allowed to access
certain resources or tasks. Usually, according to their powers and responsibilities, users are …
certain resources or tasks. Usually, according to their powers and responsibilities, users are …
Hierarchical key assignment schemes with key rotation
Hierarchical structures are frequently used to manage access to sensitive data in various
contexts, ranging from organizational settings to IoT networks. A Hierarchical Key …
contexts, ranging from organizational settings to IoT networks. A Hierarchical Key …