2023
DOI: 10.36227/techrxiv.21510768.v3
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

A Dynamic Time-Bound Access Control for Secure Hierarchical Content Sharing

Abstract: <p>With rapid growth of mobile users, protecting content from unauthorized users become a complex problem. The concept of temporal role-based access control reduces complexity of user management and restricts access to specified time-slots. But, content privacy is still questionable in case of system resources compromise unexpectedly. Therefore, cryptographic solution for time-bound hierarchical content management is an emerging problem. Most of the related schemes focused on individual user keys and/or … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 28 publications
(44 reference statements)
0
0
0
Order By: Relevance
“…Chien's protocol [19] uses two secure hash functions to acheive a time-bound security requirement. The system can randomly select two integers as x s and x e in GF(p), where p is a large prime.…”
Section: Time-bound Methods Of Chien's Protocol [19]mentioning
confidence: 99%
See 1 more Smart Citation
“…Chien's protocol [19] uses two secure hash functions to acheive a time-bound security requirement. The system can randomly select two integers as x s and x e in GF(p), where p is a large prime.…”
Section: Time-bound Methods Of Chien's Protocol [19]mentioning
confidence: 99%
“…Without this, login tickets could be exploited indefinitely, or lost devices might leave open sessions, potentially leading to unauthorized access or data breaches. A time-bound hierarchical key agreement thus restricts key derivation by class relationships and time, addressing these vulnerabilities [19].…”
Section: Research Motivationsmentioning
confidence: 99%