搜索结果: 1-5 共查到“军事学 Hierarchy”相关记录5条 . 查询时间(0.046 秒)
ID-HABE: Incorporating ID-based Revocation, Delegation, and Authority Hierarchy into Attribute-Based Encryption
Identity-Based Revocation Delegation Attribute-Based Encryption
2017/11/20
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has been proposed to implement fine-grained access control. Data owners encrypt data with a certain access policy so that only data users whose at...
Enhancing Attribute-Based Encryption with Attribute Hierarchy
Attribute-Based Hierarchy Encryption
2009/7/1
Attribute-based encryption (ABE) has been envisioned
as a promising cryptographic primitive for realizing secure
and flexible access control. However, ABE is being criticized
for its high scheme ov...
An Access Control Scheme for Partially Ordered Set Hierarchy with Provable Security
Access Control Scheme Partially Ordered Set Hierarchy Provable Security
2009/4/1
In a hierarchical structure, an entity has access to another
if and only if the former is a superior of the later. The access control
scheme for a hierarchy represented by a partially ordered set (p...
The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures
Hierarchy of Key Evolving Signatures Characterization Proxy Signatures
2009/3/24
For the last two decades the notion and implementations of proxy signatures have been used to allow transfer of digital signing power within some context (in order to enable
exibility of signers wit...
Algebraic Immunity Hierarchy of Boolean Functions
Boolean functions algebraic attack algebraic immunity
2008/8/19
Algebraic immunity of Boolean functions is a very important concept in recently intro-
duced algebraic attacks of stream cipher.