Enforcing the security of a time-bound hierarchical key assignment scheme.
Alfredo De SantisAnna Lisa FerraraBarbara MasucciPublished in: Inf. Sci. (2006)
Keyphrases
- high security
- private key
- secure communication
- security analysis
- digital signature scheme
- authentication scheme
- key distribution
- public key
- security policies
- upper bound
- key exchange
- encryption key
- access control
- protection schemes
- intrusion detection
- protection scheme
- diffie hellman
- secret sharing scheme
- security model
- elliptic curve cryptography
- authentication mechanism
- smart card
- key agreement protocol
- key management scheme
- key agreement
- public key cryptosystem
- identity based cryptography
- chosen plaintext
- image encryption
- authentication protocol
- security mechanisms
- secret key
- security issues
- coarse to fine
- information security
- worst case
- security level
- provably secure
- hierarchical tree
- ciphertext
- digital signature
- security requirements
- cloud computing
- lower bound