2010
DOI: 10.1007/s00145-010-9094-6
|View full text |Cite
|
Sign up to set email alerts
|

Provably-Secure Time-Bound Hierarchical Key Assignment Schemes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
60
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 55 publications
(60 citation statements)
references
References 37 publications
0
60
0
Order By: Relevance
“…Their aim was to propose a collusion secure scheme. However, later in 2006, Ateniese et al found a two party collusion attack in their scheme. The attack also reflected in a later work proposed by Yeh …”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Their aim was to propose a collusion secure scheme. However, later in 2006, Ateniese et al found a two party collusion attack in their scheme. The attack also reflected in a later work proposed by Yeh …”
Section: Discussionmentioning
confidence: 99%
“…We here prove that the proposed scheme is secure against stronger security notion, ie, key i n d i s t i n g u i s h a b i l i t y . Remember that the work of Ateniese et al in 2006 proved that a THKAS is secure against static indistinguishable adversary if and only if it is secure against an adaptive indistinguishable adversary. For the sake of easiness of the proof, we consider the static indistinguishable adversary in our proof model that implies the security against an adaptive indistinguishable adversary.…”
Section: New Schemementioning
confidence: 99%
“…Later, Chien 20 applied hash chaining to greatly improve the computational performance. Ateniese et al 21 proposed a formally probably secure scheme in a formal model. Inspired by Chien 20 and Ateniese et al, 21 we propose a range-bound key assignment and apply the technique to reduce the communication overhead of long AV lists.…”
Section: Related Workmentioning
confidence: 99%
“…Benaloh [8] presented an encryption technique which was originally proposed for concisely sending large number of keys in broadcast situation. We will review briefly its key derivation process here for a concrete description of what are the desirable properties we want to achieve.…”
Section: B Appressed Key In Symmetric Key Encryptionmentioning
confidence: 99%
“…Cryptographic key assignment schemes (e.g. [4], [8]) aim to minimize the cost in managing and storing secret keys for universal cryptographic use. Developing a tree structure for storing keys, a key for a given branch can be utilized for deriving the keys of its descendant nodes.…”
Section: Other Schemesmentioning
confidence: 99%