A dynamic cryptographic key assignment scheme in a tree structure

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Comments on a cryptographic key assignment scheme

In this paper we analyse the security of a cryptographic key assignment scheme, recently proposed by Huang and Chang, that is designed to provide time-constrained hierarchical access control. We show that the new scheme has potential security vulnerabilities, which enable malicious users and attackers to violate the privacy of other users. keywords: Key assignment, Access control.

متن کامل

An Improvement of Novel Cryptographic Key Assignment Scheme for Dynamic Access Control in a Hierarchy

This letter presents a cryptographic key assignment scheme for dynamic access control in a hierarchy. A scheme for extending a previous cryptographic key assignment scheme to reduce the computation required for key generation and derivation algorithms is also proposed.

متن کامل

An Asymmetric Cryptographic Key Assignment Scheme for Access Control in Tree Structural Hierarchies

In a hierarchical structure, a user in a security class has access to information items of another class if and only if the former class is a predecessor of latter. Based upon cryptographic techniques, several schemes have been proposed for solving the problem of access control in hierarchical structures. In this paper, we propose a new scheme for an access control in tree structural hierarchie...

متن کامل

A Cryptographic Key Assignment Scheme with Adaptable Time- token Constraint in a Hierarchy

A scheme, which uses flexible cryptographic key management upon adaptable time-token constraint for a user hierarchy access control (UHAC) scheme, is proposed in this paper. For adapting the changeability in a UHAC system, we propose a technique of assigning independent time-token which is distributed by a trusted agency server to reply an authorized user for once secure access request. The key...

متن کامل

A New Cryptographic Key Assignment Scheme using a One-way Hash Function

Access control in a hierarchy plays an important role in today’s communication networks. To guarantee the quality of communication services it is necessary to construct a low-computation dynamic access control scheme for the use to obtain the secure information. Therefore, we propose an efficient identity-based cryptographic key assignment scheme in which the cryptographic key of each user is c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computers & Mathematics with Applications

سال: 1993

ISSN: 0898-1221

DOI: 10.1016/0898-1221(93)90305-f