An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy
IEEE Transactions on Computers
Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
A secure and privacy-protecting protocol for transmitting personal information between organizations
Proceedings on Advances in cryptology---CRYPTO '86
Security mechanisms for computer networks
Security mechanisms for computer networks
A cryptographic key generation scheme for multilevel data security
Computers and Security
Witness indistinguishable and witness hiding protocols
STOC '90 Proceedings of the twenty-second annual ACM symposium on Theory of computing
Cryptographic key assignment scheme for access control in a hierarchy
Information Systems
Computer communications security: principles, standard protocols and techniques
Computer communications security: principles, standard protocols and techniques
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
A taxonomy for key escrow encryption systems
Communications of the ACM
Inter-protocol interleaving attacks on some authentication and key distribution protocols
Information Processing Letters
Common modulus and chosen-message attacks on public-key schemes with linear recurrence relations
Information Processing Letters
Anonymous authentication with subset queries (extended abstract)
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Cryptographic solution to a problem of access control in a hierarchy
ACM Transactions on Computer Systems (TOCS)
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy
IEEE Transactions on Knowledge and Data Engineering
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
Efficient techniques for realizing geo-spatial access control
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
New constructions for provably-secure time-bound hierarchical key assignment schemes
Proceedings of the 12th ACM symposium on Access control models and technologies
New constructions for provably-secure time-bound hierarchical key assignment schemes
Theoretical Computer Science
Privacy-enhancing methods for e-health applications: how to prevent statistical analyses and attacks
International Journal of Business Intelligence and Data Mining
Variations on a theme by Akl and Taylor: Security and tradeoffs
Theoretical Computer Science
Provably secure key assignment schemes from factoring
ACISP'11 Proceedings of the 16th Australasian conference on Information security and privacy
GPC'10 Proceedings of the 5th international conference on Advances in Grid and Pervasive Computing
Incorporating temporal capabilities in existing key management schemes
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
A note on time-bound hierarchical key assignment schemes
Information Processing Letters
Simple, efficient and strongly KI-Secure hierarchical key assignment schemes
CT-RSA'13 Proceedings of the 13th international conference on Topics in Cryptology
Hi-index | 0.00 |
We consider the security problem for retrieving data from a web site (or a large database system) via Internet. Consider the situation that a user visits a web site to get information. He wants to retain anonymity of his identity, while the web site would like to authenticate the user's identity. We proposed an anonymous authentication scheme to provide a solution for these two seemingly conflicting requirements. Our anonymous authentication scheme is based on cryptographic techniques. Together with a novel time-dependent hierarchical key assignment scheme, we proposed a data access system that has the following distinct features simultaneously: (1) anonymous authentication, (2) cryptographic access control, (3) saving on-line encryption time, and (4) a flexible subscription system.