In recent years, we have seen the development of key assignment schemes that use cryptography to enforce time-based authorization policies. One of the most important aspects of these schemes is the balance between the time required to derive keys and the amount of storage required for the public information from which keys are derived. The derivation time and storage are dependent on the number of time periods used in the authorization policy. In this paper, we discuss novel schemes that achieve good trade-offs between these competing parameters and for which explicit bounds can be given in terms of the number of time periods. © Springer-Verlag 2009.
CITATION STYLE
Crampton, J. (2009). Trade-offs in cryptographic implementations of temporal access control. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5838 LNCS, pp. 72–87). https://doi.org/10.1007/978-3-642-04766-4_6
Mendeley helps you to discover research relevant for your work.