We consider the problem of efficient key management and user revocation in cryptographic file systems that allow shared access to files. A performance-efficient solution to user revocation in such systems is lazy revocation, a method that delays the re-encryption of a file until the next write to that file. We formalize the notion of key-updating schemes for lazy revocation, an abstraction to manage cryptographic keys in file systems with lazy revocation, and give a security definition for such schemes. We give two composition methods that combine two secure key-updating schemes into a new secure scheme that permits a larger number of user revocations. We prove the security of two slightly modified existing constructions and propose a novel...
As a one-to-many public key encryption system, attribute-based encryption (ABE) enables scalable acc...
Our goal is to design encryption schemes for mass distribution of data that enable to (1) deter user...
[[abstract]]This paper presents both the theoretical and practical aspects of secure group communica...
We consider the problem of efficient key management and user revocation in cryptographic file system...
We consider the problem of efficient key management and user revocation in cryptographic file system...
Abstract A crucial element of distributed cryptographic file systems are key management solutions th...
International audienceWhile extensive research addresses the problem of establishing session keys th...
While extensive research addresses the problem of establish-ing session keys through cryptographic p...
Hierarchical access control policies are used to restrict access to objects by users based on their ...
A revocation mechanism in cryptosystems for a large number of users is absolutely necessary to maint...
The Plutus file system introduced the notion of key rotation as a means to derive a sequence of temp...
Abstract. Secure group communication relies on secure and robust distribution of group keys. A state...
Identity-based encryption (IBE) is an exciting alternative to public-key encryption, as IBE eliminat...
Abstract. We proposed a new public-key traitor tracing scheme with revocation capability using dynam...
Part 2: The 2014 Asian Conference on Availability, Reliability and Security, AsiaARES 2014Internatio...
As a one-to-many public key encryption system, attribute-based encryption (ABE) enables scalable acc...
Our goal is to design encryption schemes for mass distribution of data that enable to (1) deter user...
[[abstract]]This paper presents both the theoretical and practical aspects of secure group communica...
We consider the problem of efficient key management and user revocation in cryptographic file system...
We consider the problem of efficient key management and user revocation in cryptographic file system...
Abstract A crucial element of distributed cryptographic file systems are key management solutions th...
International audienceWhile extensive research addresses the problem of establishing session keys th...
While extensive research addresses the problem of establish-ing session keys through cryptographic p...
Hierarchical access control policies are used to restrict access to objects by users based on their ...
A revocation mechanism in cryptosystems for a large number of users is absolutely necessary to maint...
The Plutus file system introduced the notion of key rotation as a means to derive a sequence of temp...
Abstract. Secure group communication relies on secure and robust distribution of group keys. A state...
Identity-based encryption (IBE) is an exciting alternative to public-key encryption, as IBE eliminat...
Abstract. We proposed a new public-key traitor tracing scheme with revocation capability using dynam...
Part 2: The 2014 Asian Conference on Availability, Reliability and Security, AsiaARES 2014Internatio...
As a one-to-many public key encryption system, attribute-based encryption (ABE) enables scalable acc...
Our goal is to design encryption schemes for mass distribution of data that enable to (1) deter user...
[[abstract]]This paper presents both the theoretical and practical aspects of secure group communica...