A KEY-MANAGEMENT SCHEME BASED ON CONTROL VECTORS

被引:7
|
作者
MATYAS, SM [1 ]
LE, AV [1 ]
ABRAHAM, DG [1 ]
机构
[1] IBM CORP,US MARKETING & SERV,CHARLOTTE,NC 28257
关键词
D O I
10.1147/sj.302.0175
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a cryptographic key-management scheme based on control vectors. This is a new concept that permits cryptographic keys belonging to a cryptographic system to be easily, securely, and efficiently controlled. The new key-management scheme-built on the cryptographic architecture and key management implemented in a prior set of IBM cryptographic products-has been implemented in the newly announced IBM Transaction Security System.
引用
收藏
页码:175 / 191
页数:17
相关论文
共 50 条
  • [41] A Secure Key Management Scheme for Hierarchical Access Control with Secret Key Validity Checking
    Abi-Char, Pierre E.
    Nader, Patrick
    Mahfouz, Sandy
    [J]. 2021 44TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2021, : 27 - 33
  • [42] An efficient key management scheme for user access control in outsourced databases
    Seungtae Hong
    Hyeong-Il Kim
    Jae-Woo Chang
    [J]. World Wide Web, 2017, 20 : 467 - 490
  • [43] Efficient Hierarchical Key Management Scheme for Access Control in the Mobile Agent
    Chung, Yu-Fang
    Chen, Tzer-Shyong
    Liu, Chia-Hui
    Wang, Tzu-Chi
    [J]. 2008 22ND INTERNATIONAL WORKSHOPS ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOLS 1-3, 2008, : 650 - +
  • [44] Efficient hierarchical key management scheme for access control in the mobile agent
    Chung, Yufang
    Chen, Tzershyong
    Liu, Chiahui
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2008, 4 (09): : 2375 - 2389
  • [45] Efficient Key Management Model and Scheme for Content Access Control in Hierarchies
    Ragab-Hassen, Hani
    [J]. 2010 IEEE GLOBECOM WORKSHOPS, 2010, : 1492 - 1496
  • [46] An efficient key management scheme for user access control in outsourced databases
    Hong, Seungtae
    Kim, Hyeong-Il
    Chang, Jae-Woo
    [J]. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2017, 20 (03): : 467 - 490
  • [47] A new class of key management scheme for access control in dynamic hierarchies
    Zou, X.
    Bai, L.
    [J]. International Journal of Computers and Applications, 2008, 30 (04) : 331 - 337
  • [48] An efficient key management scheme for content access control for linear hierarchies
    Hassen, Hani Ragab
    Bettahar, Hatem
    Bouadbdallah, Abdalmadjid
    Challal, Yacine
    [J]. COMPUTER NETWORKS, 2012, 56 (08) : 2107 - 2118
  • [49] A private key management scheme
    Gao Huming
    Lv Xin
    [J]. 2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL I, 2009, : 16 - 19
  • [50] Access Control and Key Management Scheme based on Bilinear Pairings over Elliptic Curves for Mobile Agent
    Liu, Chia-Hui
    Chung, Yu-Fang
    Chen, Tzer-Shyong
    Wang, Sheng-De
    [J]. THIRD INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING (MUE 2009), 2009, : 189 - +