Security of Chien's Efficient Time-Bound Hierarchical Key Assignment Scheme
IEEE Transactions on Knowledge and Data Engineering
An RSA-based time-bound hierarchical key assignment scheme for electronic article subscription
Proceedings of the 14th ACM international conference on Information and knowledge management
Applying hierarchical and role-based access control to XML documents
SWS '04 Proceedings of the 2004 workshop on Secure web service
Merging: An Efficient Solution for a Time-Bound Hierarchical Key Assignment Scheme
IEEE Transactions on Dependable and Secure Computing
Provably-secure time-bound hierarchical key assignment schemes
Proceedings of the 13th ACM conference on Computer and communications security
New constructions for provably-secure time-bound hierarchical key assignment schemes
Proceedings of the 12th ACM symposium on Access control models and technologies
A secure time-bound hierarchical key assignment scheme based on RSA public key cryptosystem
Information Processing Letters
On replacing cryptographic keys in hierarchical key management systems
Journal of Computer Security - The Third IEEE International Symposium on Security in Networks and Distributed Systems
New constructions for provably-secure time-bound hierarchical key assignment schemes
Theoretical Computer Science
Enforcing non-hierarchical access policies by hierarchical key assignment schemes
Information Processing Letters
An efficient key assignment scheme for access control in a large leaf class hierarchy
Information Sciences: an International Journal
Secure mobile subscription of sensor-encrypted data
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Enforcement of non-hierarchical access policies
ICCOM'06 Proceedings of the 10th WSEAS international conference on Communications
GPC'10 Proceedings of the 5th international conference on Advances in Grid and Pervasive Computing
A novel broadcast encryption based on time-bound cryptographic keys
DRMTICS'05 Proceedings of the First international conference on Digital Rights Management: technologies, Issues, Challenges and Systems
Enforcing the security of a time-bound hierarchical key assignment scheme
Information Sciences: an International Journal
A Novel Cryptographic Key Assignment Scheme with ID-Based Access Control in a Hierachy
Fundamenta Informaticae
Incorporating temporal capabilities in existing key management schemes
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Hi-index | 0.00 |
Tzeng proposes a time-bound cryptographic key assignment scheme for access control in a partial-order hierarchy. In this paper, we show that Tzeng's scheme is insecure against the collusion attack whereby three users conspire to access some secret class keys that they should not know according to Tzeng's scheme.