搜索结果: 1-5 共查到“军队指挥学 key assignment”相关记录5条 . 查询时间(0.046 秒)
Key Assignment Scheme with Authenticated Encryption
Key assignment schemes (KAS) Message-locked encryption (MLE) Authenticated encryption (AE)
2019/1/2
The Key Assignment Scheme (KAS) is a well-studied cryptographic primitive used for hierarchical access control (HAC) in a multilevel organisation where the classes of people with higher privileges can...
Key Indistinguishability vs. Strong Key Indistinguishability for Hierarchical Key Assignment Schemes
Access control key assignment provable security
2016/1/7
A hierarchical key assignment scheme is a method to assign some private information and encryption keys to a
set of classes in a partially ordered hierarchy, in such a way that the private informatio...
New Constructions for Provably-Secure Time-Bound Hierarchical Key Assignment Schemes
Access control key assignment provable security
2009/1/9
A time-bound hierarchical key assignment scheme is a method to assign time-dependent
encryption keys to a set of classes in a partially ordered hierarchy, in such a way that each class in the hierarc...
Efficient Provably-Secure Hierarchical Key Assignment Schemes
Access control key assignment provable security
2009/1/8
A hierarchical key assignment scheme is a method to assign some private information and
encryption keys to a set of classes in a partially ordered hierarchy, in such a way that the
private informati...
Provably-Secure Time-Bound Hierarchical Key Assignment Schemes
Access control key assignment provable security
2008/12/3
A time-bound hierarchical key assignment scheme is a method to assign time-dependent
encryption keys to a set of classes in a partially ordered hierarchy, in such a way that each
class can compute t...