19th IEEE Computer Security Foundations Workshop (CSFW'06)
DOI: 10.1109/csfw.2006.20
|View full text |Cite
|
Sign up to set email alerts
|

On Key Assignment for Hierarchical Access Control

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
92
0
1

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 93 publications
(98 citation statements)
references
References 48 publications
(89 reference statements)
0
92
0
1
Order By: Relevance
“…Generally, key assignment schemes rely on public information for key derivation [8]. An interesting feature of the schemes in the previous section is that no public information is used.…”
Section: Schemes With No Public Informationmentioning
confidence: 99%
See 2 more Smart Citations
“…Generally, key assignment schemes rely on public information for key derivation [8]. An interesting feature of the schemes in the previous section is that no public information is used.…”
Section: Schemes With No Public Informationmentioning
confidence: 99%
“…There are many schemes in the literature for enforcing an information flow policy using cryptographic techniques (see the survey paper of Crampton et al [8], for example). Fig.…”
Section: Key Assignment Schemesmentioning
confidence: 99%
See 1 more Smart Citation
“…A simple way to realize an encryption based scheme would be to assign a key k u to each class u ∈ V and a public information p (u,v) G (u, v) decryptions, where dist G (u, v) denotes the length of the shortest path between u and v in G. Such a scheme belongs to the family of iterative key encrypting key assignment schemes (IKEKAS), defined by Crampton et al [13], where each user is required to store a single secret value, corresponding to its key, and |E| values are made public. As regards as the security of the schemes, it depends on the security properties of the underlying encryption scheme.…”
Section: A Construction Based On Symmetric Encryption Schemesmentioning
confidence: 99%
“…Subsequently, many researchers have proposed different schemes that either have better performances or allow insertions and deletions of classes in the hierarchy (e.g., [4,21,23,27,28,29,31]). A detailed classification of many schemes in the literature has been recently provided by Crampton et al [13], according to several parameters, such as the memory requirements for public and private information, the complexity of key derivation, the complexity of handling dynamic updates to the hierarchy, and the resistance to collusive attacks. Atallah et al [4] first addressed the problem of formalizing security requirements for hierarchical key assignment schemes.…”
Section: Introductionmentioning
confidence: 99%