Key Assignment Schemes with Authenticated Encryption, revisited
A popular cryptographic option to implement Hierarchical Access Control in organizations is to combine a key assignment scheme with a symmetric encryption scheme. In brief, key assignment associates with each object in the hierarchy a unique symmetric key, and provides all higher-ranked “authorized”...
Main Authors: | Jeroen Pijnenburg, Bertram Poettering |
---|---|
Format: | Article |
Language: | English |
Published: |
Ruhr-Universität Bochum
2020-07-01
|
Series: | IACR Transactions on Symmetric Cryptology |
Subjects: | |
Online Access: | https://tosc.iacr.org/index.php/ToSC/article/view/8668 |
Similar Items
-
Key-Aggregate Searchable Encryption, Revisited: Formal Foundations for Cloud Applications, and Their Implementation
by: Masahiro Kamimura, et al.
Published: (2020-01-01) -
ARAP-SG: Anonymous and Reliable Authentication Protocol for Smart Grids
by: Muhammad Tanveer, et al.
Published: (2021-01-01) -
Key Assignment Scheme with Authenticated Encryption
by: Suyash Kandele, et al.
Published: (2018-12-01) -
A certificateless Multi-receiver Encryption scheme based on SM2 signature algorithm
by: Jinglin Zou, et al.
Published: (2023-03-01) -
Integrating Classical Preprocessing into an Optical Encryption Scheme
by: Hai Pham, et al.
Published: (2019-09-01)