Avoiding key Redistribution in Key assignment schemes

2Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

A key assignment scheme is a model for enforcing an information flow policy using cryptographic techniques. Such schemes have been widely studied in recent years. Each security label is associated with a symmetric encryption key: data objects are encrypted and authorised users are supplied with the appropriate key(s). However, updates to encryption keys pose a significant problem, as the new keys have to be issued to all authorised users. In this paper, we propose three generic approaches to key assignment schemes that remove the problem of key redistribution following key updates. We analyse the overheads incurred by these approaches and conclude that these overheads are negligible in practical applications. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Rowe, H., & Crampton, J. (2007). Avoiding key Redistribution in Key assignment schemes. In Communications in Computer and Information Science (Vol. 1, pp. 127–140). https://doi.org/10.1007/978-3-540-73986-9_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free