2002
DOI: 10.1016/s0167-4048(02)00211-0
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Key Management Scheme Based on Discrete Logarithms and Polynomial Interpolations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
41
0

Year Published

2006
2006
2016
2016

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 75 publications
(41 citation statements)
references
References 16 publications
0
41
0
Order By: Relevance
“…Most of the schemes proposed in this approach use prime numbers fundamental properties (Akl and Taylor [12], Ray et al [13], Zou et al [14]) and other theoretical cryptographic notions (Hardjono et al [15] and Zheng et al [16]). Shen and Chen [17], Zhang et al [18], Tzang et al [19] and Das et al [20] used Newton's polynomial interpolation to correlate classes' indices with their keys.…”
Section: Key Management Schemes For Cachmentioning
confidence: 99%
See 1 more Smart Citation
“…Most of the schemes proposed in this approach use prime numbers fundamental properties (Akl and Taylor [12], Ray et al [13], Zou et al [14]) and other theoretical cryptographic notions (Hardjono et al [15] and Zheng et al [16]). Shen and Chen [17], Zhang et al [18], Tzang et al [19] and Das et al [20] used Newton's polynomial interpolation to correlate classes' indices with their keys.…”
Section: Key Management Schemes For Cachmentioning
confidence: 99%
“…The complexity of some of the existing dependent-keys key management schemes [9,[11][12][13]17,20] when applied to linear hierarchies was evaluated in [6]. Table 5 uses this evaluation and compares the complexity of KTLH to the dependentkeys schemes, namely direct and indirect schemes.…”
Section: Comparison To the Existing Schemesmentioning
confidence: 99%
“…• The hierarchy is a DAG [6,8,31,59,62,67,69,87,91]. Since each vertex in a DAG can have more than one direct ancestor, key derivation methods are in general more complex than the methods used for chains or trees.…”
Section: Access Control Enforcement In the Outsourcing Scenariomentioning
confidence: 99%
“…Formally, the hierarchy is modelled as a partially ordered set (poset), each data item is labelled by a class u in the hierarchy, and is encrypted using the encryption key k u corresponding to that class. Now a user, given access to the private information S u , can derive the relevant encryption key k v for any descendant class v, and hence gain access to the data of class v. Since the original paper by Akl and Taylor, a large number of different schemes have been proposed, offering different trade-offs in terms of the amount of public and private storage required and the complexity of key derivation -see for example [2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17]. Many additional issues are addressed in these works: time-dependent constraints, dynamic addition and removal of classes, and revocation, for example.…”
mentioning
confidence: 99%