CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Secure group communications using key graphs
IEEE/ACM Transactions on Networking (TON)
Cryptographic solution to a problem of access control in a hierarchy
ACM Transactions on Computer Systems (TOCS)
Key Establishment in Large Dynamic Groups Using One-Way Function Trees
IEEE Transactions on Software Engineering
A survey of key management for secure group communication
ACM Computing Surveys (CSUR)
Dynamic and efficient key management for access hierarchies
Proceedings of the 12th ACM conference on Computer and communications security
Key management for non-tree access hierarchies
Proceedings of the eleventh ACM symposium on Access control models and technologies
On Key Assignment for Hierarchical Access Control
CSFW '06 Proceedings of the 19th IEEE workshop on Computer Security Foundations
Key management for role hierarchy in distributed systems
Journal of Network and Computer Applications
Key management for content access control in a hierarchy
Computer Networks: The International Journal of Computer and Telecommunications Networking
Efficient group key management for multi-privileged groups
Computer Communications
Hierarchical group access control for secure multicast communications
IEEE/ACM Transactions on Networking (TON)
Efficient group key management for dynamic peer networks
MSN'05 Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks
A survey of security issues in multicast communications
IEEE Network: The Magazine of Global Internetworking
Efficient provably-secure hierarchical key assignment schemes
MFCS'07 Proceedings of the 32nd international conference on Mathematical Foundations of Computer Science
Keeping group communications private: An up-to-date review on centralized secure multicast
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
Mobile Agent Application and Integration in Electronic Anamnesis System
Journal of Medical Systems
Hi-index | 0.00 |
The problem of hierarchical access control in secure group communications has elicited much interest in the literatures. However, most of the researches to date on hierarchical access control pay more attention to the particular encryption techniques, but considered little about the features of key hierarchies. In hierarchical access control systems, keys are usually organized hierarchically. We analyze the user-based, resource-based and unified key hierarchies in this paper. The first two hierarchies are established from the access matrix. By unifying these two hierarchies, we get the unified key hierarchy. Furthermore, we introduce the explicit accessible set and the explicit dominating set to describe the key distributions for these hierarchies, and prove that the unified key hierarchy can be formed from the explicit dominating sets in the user-based key hierarchy or the explicit accessible sets in the resource-based key hierarchy. To evaluate the efficiency of the described key hierarchies, we combine these hierarchies with the existing key assignment models and analyze their storage and rekey overheads. These overheads can be derived from the access matrix, and the derivation procedure is described. The conclusions of this paper can help to establish a suitable key hierarchy so as to make the key assignment scheme more efficient in practical applications.