Security and Tradeoffs of the Akl-Taylor Scheme and Its Variants
暂无分享,去创建一个
Alfredo De Santis | Anna Lisa Ferrara | Barbara Masucci | Paolo D'Arco | A. D. Santis | A. L. Ferrara | B. Masucci | P. D’Arco
[1] Wen-Guey Tzeng,et al. A secure system for data access based on anonymous authentication and time-dependent hierarchical keys , 2006, ASIACCS '06.
[2] Selim G. Akl,et al. An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy , 1985, IEEE Transactions on Computers.
[3] Maxime Crochemore,et al. Finding Patterns In Given Intervals , 2007, Fundam. Informaticae.
[4] Tomoyuki Asano. A Revocation Scheme with Minimal Storage at Receivers , 2002, ASIACRYPT.
[5] M. Rabin. DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .
[6] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[7] Marina Blanton,et al. Dynamic and Efficient Key Management for Access Hierarchies , 2009, TSEC.
[8] Alfredo De Santis,et al. Efficient Provably-Secure Hierarchical Key Assignment Schemes , 2007, MFCS.
[9] Chi-Sung Laih,et al. Merging: an efficient solution for a time-bound hierarchical key assignment scheme , 2006, IEEE Transactions on Dependable and Secure Computing.
[10] Alfredo De Santis,et al. Cryptographic key assignment schemes for any access control policy , 2004, Inf. Process. Lett..
[11] Kazukuni Kobara,et al. Broadcast encryption with short keys and transmissions , 2003, DRM '03.
[12] Min-Shiang Hwang,et al. Efficient access control and key management schemes for mobile agents , 2004, Comput. Stand. Interfaces.
[13] Lein Harn,et al. A cryptographic key generation scheme for multilevel data security , 1990, Comput. Secur..
[14] Yuliang Zheng,et al. Advances in Cryptology — ASIACRYPT 2002 , 2002, Lecture Notes in Computer Science.
[15] Mikhail J. Atallah,et al. Dynamic and efficient key management for access hierarchies , 2005, CCS '05.
[16] Leonid A. Levin,et al. A hard-core predicate for all one-way functions , 1989, STOC '89.
[17] Selim G. Akl,et al. Cryptographic solution to a problem of access control in a hierarchy , 1983, TOCS.