Constructing Key Assignment Schemes from Chain Partitions - Data and Applications Security and Privacy XXIV Access content directly
Conference Papers Year : 2010

Constructing Key Assignment Schemes from Chain Partitions

Abstract

In considering a problem in access control for scalable multimedia formats, we have developed new methods for constructing key assignment schemes. Our first contribution is to improve an existing cryptographic access control mechanism for scalable multimedia formats. We then show how our methods can be applied to a chain partition to develop alternative mechanisms for scalable multimedia formats and how these methods can themselves be extended to create a new type of key assignment scheme.
Fichier principal
Vignette du fichier
_39.pdf (146.64 Ko) Télécharger le fichier
Origin : Files produced by the author(s)
Loading...

Dates and versions

hal-01056664 , version 1 (20-08-2014)

Licence

Attribution

Identifiers

Cite

Jason Crampton, Rosli Daud, Keith M. Martin. Constructing Key Assignment Schemes from Chain Partitions. 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.130-145, ⟨10.1007/978-3-642-13739-6_9⟩. ⟨hal-01056664⟩
50 View
99 Download

Altmetric

Share

Gmail Facebook X LinkedIn More