A dynamic cryptographic key assignment scheme in a tree structure
نویسندگان
چکیده
منابع مشابه
Comments on a cryptographic key assignment scheme
In this paper we analyse the security of a cryptographic key assignment scheme, recently proposed by Huang and Chang, that is designed to provide time-constrained hierarchical access control. We show that the new scheme has potential security vulnerabilities, which enable malicious users and attackers to violate the privacy of other users. keywords: Key assignment, Access control.
متن کاملAn Improvement of Novel Cryptographic Key Assignment Scheme for Dynamic Access Control in a Hierarchy
This letter presents a cryptographic key assignment scheme for dynamic access control in a hierarchy. A scheme for extending a previous cryptographic key assignment scheme to reduce the computation required for key generation and derivation algorithms is also proposed.
متن کاملAn Asymmetric Cryptographic Key Assignment Scheme for Access Control in Tree Structural Hierarchies
In a hierarchical structure, a user in a security class has access to information items of another class if and only if the former class is a predecessor of latter. Based upon cryptographic techniques, several schemes have been proposed for solving the problem of access control in hierarchical structures. In this paper, we propose a new scheme for an access control in tree structural hierarchie...
متن کاملA Cryptographic Key Assignment Scheme with Adaptable Time- token Constraint in a Hierarchy
A scheme, which uses flexible cryptographic key management upon adaptable time-token constraint for a user hierarchy access control (UHAC) scheme, is proposed in this paper. For adapting the changeability in a UHAC system, we propose a technique of assigning independent time-token which is distributed by a trusted agency server to reply an authorized user for once secure access request. The key...
متن کاملA New Cryptographic Key Assignment Scheme using a One-way Hash Function
Access control in a hierarchy plays an important role in today’s communication networks. To guarantee the quality of communication services it is necessary to construct a low-computation dynamic access control scheme for the use to obtain the secure information. Therefore, we propose an efficient identity-based cryptographic key assignment scheme in which the cryptographic key of each user is c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computers & Mathematics with Applications
سال: 1993
ISSN: 0898-1221
DOI: 10.1016/0898-1221(93)90305-f