2018
DOI: 10.1002/cpe.4498
|View full text |Cite
|
Sign up to set email alerts
|

An efficient and provably secure time‐limited key management scheme for outsourced data

Abstract: Summary A time‐limited data access control scheme allows a user's access to the data files only for a specified time period. A cryptographic solution to the time‐limited access control problem is by encrypting each data group associated with a time period with a distinct key. The data is encrypted by the data owner. The respective decryption keys are then distributed to authorized users by the data owner. A user requires one secret decryption key storage for each authorized time period. To reduce the secret ke… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 36 publications
0
2
0
Order By: Relevance
“…Wait for the energy, to achieve online "one-stop" service [17]. On the public network, you can carry out project consultation, application form download, online submission application, approval result release, online information exchange, identity authentication, online complaints, and other functions [18]. e enterprise applying for approval will register the identity through the public portal.…”
Section: External Networkmentioning
confidence: 99%
“…Wait for the energy, to achieve online "one-stop" service [17]. On the public network, you can carry out project consultation, application form download, online submission application, approval result release, online information exchange, identity authentication, online complaints, and other functions [18]. e enterprise applying for approval will register the identity through the public portal.…”
Section: External Networkmentioning
confidence: 99%
“…Kumar et al present an efficient and secure time‐limited hierarchical key assignment scheme key management suitable for data outsourcing scenario. They compare the proposed scheme with other recent similar schemes with respect to the cost of static and dynamic operations.…”
mentioning
confidence: 99%