2008 the Fourth International Conference on Information Assurance and Security 2008
DOI: 10.1109/ias.2008.51
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Hierarchical Group-Oriented Key Establishment and Decryption

Abstract: In this paper, we present three related and efficient cryptographic schemes for secure communication for hierarchically composed user groups. In such a group, each user is associated with a hierarchical level, so that the group members are divided into two or more hierarchical security classes. Most existing hierarchical cryptographic schemes provide hierarchical deduction of hierarchically arranged predefined keys. In contrast, the first scheme provides secure establishment of hierarchically ordered session k… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2009
2009
2009
2009

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 30 publications
0
2
0
Order By: Relevance
“…The messages from the information M, which will be accessed by decryption by a user, will be those for which the user has rights. These rights can be organized with the help of access levels [8] [9]. Between levels there are hierarchical links.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The messages from the information M, which will be accessed by decryption by a user, will be those for which the user has rights. These rights can be organized with the help of access levels [8] [9]. Between levels there are hierarchical links.…”
Section: Introductionmentioning
confidence: 99%
“…The central subject of this paper is the description of an encryption system elaborated to ensure the access to an encrypted information in a differentiated way. This system is structured on levels of access [7] [8]. The algorithm is based on the El Gamal encryption system [1][3] [4] and, in this article, it will be further called the ElGamal with differentiated decryption on k+1 access levels (EG(k+1)GA), this taking part of the category encryption systems with a public key which is based on the discrete logarithm problem.…”
Section: Introductionmentioning
confidence: 99%