Abstract A crucial element of distributed cryptographic file systems are key management solutions that allowfor flexible but secure data sharing. We consider efficient key management schemes for cryptographic file systems using lazy revocation. We give rigorous security definitions for three crypto-graphic schemes used in such systems, namely symmetric encryption, message-authentication codes and signature schemes. Additionally, we provide generic constructions for symmetric encryptionand message-authentication codes with lazy revocation using key-updating schemes for lazy revocation, which have been introduced recently. We also give a construction of signature schemes withlazy revocation from identity-based signatures. Finally, we describe...
While using the growing utilization of very network-attached storage systems, several works has focu...
Hierarchical access control policies are used to restrict access to objects by users based on their ...
While using the growing use of very network-attached storage systems, several works has focussed on ...
We consider the problem of efficient key management and user revocation in cryptographic file system...
We consider the problem of efficient key management and user revocation in cryptographic file system...
The Plutus file system introduced the notion of key rotation as a means to derive a sequence of temp...
As distributed computing systems grow in size, complexity and variety of application, the problem of...
We study the problem of key establishment for secure many-to-many communications. The problem is ins...
International audienceWhile extensive research addresses the problem of establishing session keys th...
While extensive research addresses the problem of establish-ing session keys through cryptographic p...
While using the growing usage of very network-attached storage systems, several works has focussed o...
Abstract. We model networked storage systems with distributed, cryptographically enforced file-acces...
In this paper the key storage problem associated with the provision of secure communications between...
We have developed a scheme to secure networkattached storage systems against many types of attacks. ...
A cryptographic network file system has to guarantee confidentiality and integrity of its files, and...
While using the growing utilization of very network-attached storage systems, several works has focu...
Hierarchical access control policies are used to restrict access to objects by users based on their ...
While using the growing use of very network-attached storage systems, several works has focussed on ...
We consider the problem of efficient key management and user revocation in cryptographic file system...
We consider the problem of efficient key management and user revocation in cryptographic file system...
The Plutus file system introduced the notion of key rotation as a means to derive a sequence of temp...
As distributed computing systems grow in size, complexity and variety of application, the problem of...
We study the problem of key establishment for secure many-to-many communications. The problem is ins...
International audienceWhile extensive research addresses the problem of establishing session keys th...
While extensive research addresses the problem of establish-ing session keys through cryptographic p...
While using the growing usage of very network-attached storage systems, several works has focussed o...
Abstract. We model networked storage systems with distributed, cryptographically enforced file-acces...
In this paper the key storage problem associated with the provision of secure communications between...
We have developed a scheme to secure networkattached storage systems against many types of attacks. ...
A cryptographic network file system has to guarantee confidentiality and integrity of its files, and...
While using the growing utilization of very network-attached storage systems, several works has focu...
Hierarchical access control policies are used to restrict access to objects by users based on their ...
While using the growing use of very network-attached storage systems, several works has focussed on ...