2014
DOI: 10.1016/j.ins.2013.10.022
|View full text |Cite
|
Sign up to set email alerts
|

A secure effective key management scheme for dynamic access control in a large leaf class hierarchy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
31
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
7

Relationship

6
1

Authors

Journals

citations
Cited by 49 publications
(31 citation statements)
references
References 19 publications
0
31
0
Order By: Relevance
“…We use the proof of the formal security by the method of contradiction as in [7]. We follow the similar analysis as in [11,14,15,27], [28]. Note that one can also prove the formal security in the standard model.…”
Section: Formal Security Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…We use the proof of the formal security by the method of contradiction as in [7]. We follow the similar analysis as in [11,14,15,27], [28]. Note that one can also prove the formal security in the standard model.…”
Section: Formal Security Analysismentioning
confidence: 99%
“…Proof We follow the proof of this theorem similar to that in [11,14,15,27,28]. We need to construct an adversary A who will have the ability to derive the identity ID i of a legal user U i and the secret information X s of the BS.…”
Section: Theorem 1 Under the Assumption That A One-way Hash Function mentioning
confidence: 99%
“…In the following definition, we define IND-CPA in single and multiple eavesdropper setting [11,14,15].…”
Section: Symmetric-key Encryption Scheme X and Ind-cpamentioning
confidence: 99%
“…We use the proof of the formal security by the method of contradiction as in [28]. We follow the similar analysis as in [9,15]. Note that one can also prove the formal security in the standard model.…”
Section: Formal Security Analysismentioning
confidence: 99%
See 1 more Smart Citation