Hierarchical and shared access control
Access control ensures that only the authorized users of a system are allowed to access
certain resources or tasks. Usually, according to their roles and responsibilities, users are …
certain resources or tasks. Usually, according to their roles and responsibilities, users are …
Cryptographic hierarchical access control for dynamic structures
A hierarchical key assignment scheme is a method to assign some private information and
encryption keys to a set of classes in a partially ordered hierarchy, in such a way that the …
encryption keys to a set of classes in a partially ordered hierarchy, in such a way that the …
Key indistinguishability versus strong key indistinguishability for hierarchical key assignment schemes
A Castiglione, A De Santis… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
A hierarchical key assignment scheme is a method to assign some private information and
encryption keys to a set of classes in a partially ordered hierarchy, in such a way that the …
encryption keys to a set of classes in a partially ordered hierarchy, in such a way that the …
Supporting dynamic updates in storage clouds with the Akl–Taylor scheme
With the wide diffusion of cloud technologies, an ever increasing amount of sensitive data is
moved on centralized network-based repository services, providing elastic outsourced …
moved on centralized network-based repository services, providing elastic outsourced …
Hierarchical and shared key assignment
A Castiglione, A De Santis… - 2014 17th International …, 2014 - ieeexplore.ieee.org
Access control ensures that only the authorized users of a system are allowed to access
certain resources or tasks. Usually, according to their powers and responsibilities, users are …
certain resources or tasks. Usually, according to their powers and responsibilities, users are …
Hierarchical key assignment schemes with key rotation
Hierarchical structures are frequently used to manage access to sensitive data in various
contexts, ranging from organizational settings to IoT networks. A Hierarchical Key …
contexts, ranging from organizational settings to IoT networks. A Hierarchical Key …
Hierarchical key assignment with dynamic read-write privilege enforcement and extended ki-security
YR Chen, WG Tzeng - Applied Cryptography and Network Security: 15th …, 2017 - Springer
This paper addresses the problem of key assignment for controlling access of encrypted
data in access hierarchies. We propose a hierarchical key assignment (HKA) scheme RW …
data in access hierarchies. We propose a hierarchical key assignment (HKA) scheme RW …
On the relations between security notions in hierarchical key assignment schemes for dynamic structures
A hierarchical key assignment scheme distribute some private information and encryption
keys to a set of classes in a partially ordered hierarchy, so that the private information of …
keys to a set of classes in a partially ordered hierarchy, so that the private information of …
Key assignment schemes with authenticated encryption, revisited
J Pijnenburg, B Poettering - IACR Transactions on Symmetric …, 2020 - tosc.iacr.org
A popular cryptographic option to implement Hierarchical Access Control in organizations is
to combine a key assignment scheme with a symmetric encryption scheme. In brief, key …
to combine a key assignment scheme with a symmetric encryption scheme. In brief, key …
Optimal constructions for chain-based cryptographic enforcement of information flow policies
The simple security property in an information flow policy can be enforced by encrypting
data objects and distributing an appropriate secret to each user. A user derives a suitable …
data objects and distributing an appropriate secret to each user. A user derives a suitable …