Key Assignment Schemes with Authenticated Encryption, revisited

A popular cryptographic option to implement Hierarchical Access Control in organizations is to combine a key assignment scheme with a symmetric encryption scheme. In brief, key assignment associates with each object in the hierarchy a unique symmetric key, and provides all higher-ranked “authorized”...

Full description

Bibliographic Details
Main Authors: Jeroen Pijnenburg, Bertram Poettering
Format: Article
Language:English
Published: Ruhr-Universität Bochum 2020-07-01
Series:IACR Transactions on Symmetric Cryptology
Subjects:
Online Access:https://tosc.iacr.org/index.php/ToSC/article/view/8668