Secure Protocol of ABAC Certificates Revocation and Delegation.
Alexey RabinEhud GudesPublished in: FPS (2017)
Keyphrases
- trusted third party
- access control
- security model
- public key
- key distribution
- authentication protocol
- security requirements
- blind signature
- security analysis
- covert channel
- provably secure
- cryptographic protocols
- digital signature
- mutual authentication
- security mechanisms
- data security
- public key cryptography
- third party
- security protocols
- key management
- identity management
- credit card
- group communication
- electronic voting
- security services
- role based access control
- access control policies
- key exchange protocol
- homomorphic encryption
- privacy protection
- private key
- security policies
- scalar product
- diffie hellman
- security properties
- access control systems
- public key infrastructure
- trust relationships
- key exchange
- signature scheme
- secure communication
- conflict resolution
- access control mechanism
- password authentication
- secure routing
- blind signature scheme
- key agreement protocol
- lightweight
- secret key
- secure multi party
- rfid systems
- smart card
- cryptographic algorithms
- multi party
- standard model
- distributed systems
- vertically partitioned data
- key agreement
- elliptic curve
- authentication scheme
- user privacy
- mobile payment
- digital rights management