2011
DOI: 10.1016/j.tcs.2011.06.024
|View full text |Cite
|
Sign up to set email alerts
|

Efficient provably-secure hierarchical key assignment schemes

Abstract: A hierarchical key assignment scheme is a method to assign some private information and encryption keys to a set of classes in a partially ordered hierarchy, in such a way that the private information of a higher class can be used to derive the keys of all classes lower down in the hierarchy. In this paper we design and analyze hierarchical key assignment schemes which are provably-secure and support dynamic updates to the hierarchy with local changes to the public information and without requiring any private… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 37 publications
(31 citation statements)
references
References 31 publications
0
31
0
Order By: Relevance
“…Steiner TC-spanners of general d-dimensional posets. We continue the study of the number of edges in a sparsest Steiner k-TC-spanner of a poset as a function of its dimension, following [4] and [21]. Observe that the only poset of dimension 1 is the directed line H n,1 .…”
Section: Our Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Steiner TC-spanners of general d-dimensional posets. We continue the study of the number of edges in a sparsest Steiner k-TC-spanner of a poset as a function of its dimension, following [4] and [21]. Observe that the only poset of dimension 1 is the directed line H n,1 .…”
Section: Our Resultsmentioning
confidence: 99%
“…An access hierarchy is a partially ordered set G of access classes. Each user is entitled to access a certain class and all classes reachable from the corresponding node in G. One approach to enforcing the access hierarchy is to use a key management scheme of the following form [5,6,21,4]. Each edge (i, j) has an associated public key P (i, j), and each node i, an associated secret key k i .…”
Section: Applicationsmentioning
confidence: 99%
See 1 more Smart Citation
“…This problem arises in content distribution, operating systems, and project development (see, e.g., the references in [8]). One approach to the access control problem [7,8,46] is to associate public information P (i, j) with each edge (i, j) ∈ G and a secret key k i with each node i. There is an efficient algorithm A which takes k i and P (i, j) and generates k j .…”
Section: Applications Of Tc-spannersmentioning
confidence: 99%
“…Another hierarchical scheme that was designed to increase efficiency can be found in [33]. Daza in [34] presented a BE approach for mobile ad-hoc networks.…”
Section: The Broadcast Encryption Schemesmentioning
confidence: 99%