An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy
IEEE Transactions on Computers
Cryptographic implementation of a tree hierarchy for access control
Information Processing Letters
Secure Broadcasting Using the Secure Lock
IEEE Transactions on Software Engineering
A cryptographic key generation scheme for multilevel data security
Computers and Security
Cryptographic key assignment scheme for access control in a hierarchy
Information Systems
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Communications of the ACM
Communications of the ACM
Cryptographic solution to a problem of access control in a hierarchy
ACM Transactions on Computer Systems (TOCS)
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Cryptography and data security
Cryptography and data security
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Some Remarks on Lucas-Based Cryptosystems
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
IFIP/Sec '93 Proceedings of the IFIP TC11, Ninth International Conference on Information Security: Computer Security
A temporal key management scheme for secure broadcasting of XML documents
Proceedings of the 9th ACM conference on Computer and communications security
Secure Publishing of XML Documents
EDBT '02 Proceedings of the Worshops XMLDM, MDDE, and YRWS on XML-Based Data Management and Multimedia Engineering-Revised Papers
Efficient Time-Bound Hierarchical Key Assignment Scheme
IEEE Transactions on Knowledge and Data Engineering
Database Security-Concepts, Approaches, and Challenges
IEEE Transactions on Dependable and Secure Computing
Security of Chien's Efficient Time-Bound Hierarchical Key Assignment Scheme
IEEE Transactions on Knowledge and Data Engineering
An RSA-based time-bound hierarchical key assignment scheme for electronic article subscription
Proceedings of the 14th ACM international conference on Information and knowledge management
Dynamic and efficient key management for access hierarchies
Proceedings of the 12th ACM conference on Computer and communications security
Applying hierarchical and role-based access control to XML documents
SWS '04 Proceedings of the 2004 workshop on Secure web service
Merging: An Efficient Solution for a Time-Bound Hierarchical Key Assignment Scheme
IEEE Transactions on Dependable and Secure Computing
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Provably-secure time-bound hierarchical key assignment schemes
Proceedings of the 13th ACM conference on Computer and communications security
Efficient techniques for realizing geo-spatial access control
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
New constructions for provably-secure time-bound hierarchical key assignment schemes
Proceedings of the 12th ACM symposium on Access control models and technologies
A secure time-bound hierarchical key assignment scheme based on RSA public key cryptosystem
Information Processing Letters
On replacing cryptographic keys in hierarchical key management systems
Journal of Computer Security - The Third IEEE International Symposium on Security in Networks and Distributed Systems
New constructions for provably-secure time-bound hierarchical key assignment schemes
Theoretical Computer Science
Dynamic and Efficient Key Management for Access Hierarchies
ACM Transactions on Information and System Security (TISSEC)
A novel application of grey system theory to information security (Part I)
Computer Standards & Interfaces
Enforcing non-hierarchical access policies by hierarchical key assignment schemes
Information Processing Letters
Access control for XML documents and data
Information Security Tech. Report
Design of a lattice-based access control scheme
SMC'09 Proceedings of the 2009 IEEE international conference on Systems, Man and Cybernetics
Scalable key management for secure multicast communication in the mobile environment
Pervasive and Mobile Computing
Efficient multi-dimensional key management in broadcast services
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
An efficient key assignment scheme for access control in a large leaf class hierarchy
Information Sciences: an International Journal
Secure mobile subscription of sensor-encrypted data
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Efficient and scalable hierarchical key assignment scheme
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
Enforcement of non-hierarchical access policies
ICCOM'06 Proceedings of the 10th WSEAS international conference on Communications
Comparison-based encryption for fine-grained access control in clouds
Proceedings of the second ACM conference on Data and Application Security and Privacy
GPC'10 Proceedings of the 5th international conference on Advances in Grid and Pervasive Computing
A novel broadcast encryption based on time-bound cryptographic keys
DRMTICS'05 Proceedings of the First international conference on Digital Rights Management: technologies, Issues, Challenges and Systems
Enforcing the security of a time-bound hierarchical key assignment scheme
Information Sciences: an International Journal
A Novel Cryptographic Key Assignment Scheme with ID-Based Access Control in a Hierachy
Fundamenta Informaticae
Incorporating temporal capabilities in existing key management schemes
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
A note on time-bound hierarchical key assignment schemes
Information Processing Letters
Improving security and efficiency of time-bound access to outsourced data
Proceedings of the 6th ACM India Computing Convention
CloudHKA: a cryptographic approach for hierarchical access control in cloud computing
ACNS'13 Proceedings of the 11th international conference on Applied Cryptography and Network Security
Access control and query verification for untrusted databases
DBSec'13 Proceedings of the 27th international conference on Data and Applications Security and Privacy XXVII
Hi-index | 0.00 |
The cryptographic key assignment problem is to assign cryptographic keys to a set of partially ordered classes so that the cryptographic key of a higher class can be used to derive the cryptographic key of a lower class. In this paper, we propose a time-bound cryptographic key assignment scheme in which the cryptographic keys of a class are different for each time period, that is, the cryptographic key of class $C_i$ at time $t$ is $K_{i,t}$. Key derivation is constrained not only by the class relation, but also the time period. In our scheme, each user holds some secret parameters whose number is independent of the number of the classes in the hierarchy and the total time periods. We present two novel applications of our scheme. One is to broadcast data to authorized users in a multilevel-security way and the other is to construct a flexible cryptographic key backup system.