A KEY-MANAGEMENT SCHEME BASED ON CONTROL VECTORS

被引:7
|
作者
MATYAS, SM [1 ]
LE, AV [1 ]
ABRAHAM, DG [1 ]
机构
[1] IBM CORP,US MARKETING & SERV,CHARLOTTE,NC 28257
关键词
D O I
10.1147/sj.302.0175
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a cryptographic key-management scheme based on control vectors. This is a new concept that permits cryptographic keys belonging to a cryptographic system to be easily, securely, and efficiently controlled. The new key-management scheme-built on the cryptographic architecture and key management implemented in a prior set of IBM cryptographic products-has been implemented in the newly announced IBM Transaction Security System.
引用
收藏
页码:175 / 191
页数:17
相关论文
共 50 条
  • [31] A novel key management and access control scheme for mobile agent
    Pan, Jen-Yi
    Chen, Tzer-Long
    Chen, Tzer-Shyong
    [J]. COMPUTATIONAL INTELLIGENCE, PT 2, PROCEEDINGS, 2006, 4114 : 334 - 345
  • [32] KTR: an efficient key management scheme for air access control
    Gu, QJ
    Liu, P
    Lee, WC
    Chu, CH
    [J]. PROCEEDINGS OF MOBIQUITOUS 2005, 2005, : 499 - 501
  • [33] A practical key management scheme for access control in a user hierarchy
    Zhong, S
    [J]. COMPUTERS & SECURITY, 2002, 21 (08) : 750 - 759
  • [34] Reactive key management scheme for access control in group communications
    Kim, Heeyoul
    Lee, Younho
    Park, Yongsu
    Yoon, Hyunsoo
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2007, E90B (04) : 982 - 986
  • [35] A Key Management Scheme Based on Grouping within Cluster
    Bao, Xirong
    Liu, Jin
    She, Lihuang
    Zhang, Shi
    [J]. 2014 11TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION (WCICA), 2014, : 3455 - 3460
  • [36] Key Management Scheme for IoT Based Supply Chain
    Chamekh, Marwa
    Hamdi, Mohamed
    El Asmi, Sadok
    Kim, Tai-Hoon
    [J]. 2018 8TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSIT), 2018, : 271 - 275
  • [37] A Key Management Scheme Based on Hypergraph for Fog Computing
    Zhi Li
    Yanzhu Liu
    Di Liu
    Chunyang Li
    Wei Cui
    Guanglin Hu
    [J]. China Communications, 2018, 15 (11) : 158 - 170
  • [38] A key management scheme of wsn based on trust mechanism
    Zhou, Yuying
    Zhao, Zhihong
    Yu, Jiangjie
    [J]. Sensors and Transducers, 2014, 174 (07): : 103 - 108
  • [39] A Key Management Scheme Based on Hypergraph for Fog Computing
    Li, Zhi
    Liu, Yanzhu
    Liu, Di
    Li, Chunyang
    Cui, Wei
    Hu, Guanglin
    [J]. CHINA COMMUNICATIONS, 2018, 15 (11) : 158 - 170
  • [40] Scalable QKD Network Using Simple Key-Management Technique with On-Demand Crypto-Key Supply
    Maeda, W.
    Tanaka, A.
    Takahashi, S.
    Tajima, A.
    Tomita, A.
    [J]. 2008 34TH EUROPEAN CONFERENCE ON OPTICAL COMMUNICATION (ECOC), 2008,