New hierarchical assignment without public key cryptography

被引:19
|
作者
Chien, HY [1 ]
Jan, JK
机构
[1] ChaoYang Univ Technol, Dept Informat Management, Taichung 413, Taiwan
[2] Natl Chung Hsing Univ, Inst Comp Sci, Taichung, Taiwan
关键词
cryptography; key assignment;
D O I
10.1016/S0167-4048(03)00613-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The access privileges in many distributed systems can be effectively organized as a hierarchical tree. Distributing distinct cryptographic keys to distinct entities, according to their privileges, provides a good solution to the hierarchical access control problem. Many existing key assignment schemes use public key cryptography, which requires lots of costly public key operations and thus leads to a limited degree of deployment. In this paper, we shall propose a new key assignment protocol that employs only a low cost smart card with little memory to perform simple arithmetic operations. Our approach greatly reduces the computational load and the implementation cost. Compared with Lin's scheme, which is a very efficient scheme without using any public key cryptography, our new scheme further reduces the computational cost by as much as 66% and the quantity of public data by 50%.
引用
收藏
页码:523 / 526
页数:4
相关论文
共 50 条
  • [1] Hierarchical key assignment without public-key cryptography
    Lin, CH
    COMPUTERS & SECURITY, 2001, 20 (07) : 612 - 619
  • [2] A Cryptocurrency Without Public-Key Cryptography
    Bonneau, Joseph
    Miller, Andrew
    SECURITY PROTOCOLS XXII, 2014, 8809 : 350 - 358
  • [3] New Protocol for Quantum Public Key Cryptography
    Parakh, Abhishek
    2015 IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNCATIONS SYSTEMS (ANTS), 2015,
  • [4] Public key cryptography
    Garfinkel, SL
    COMPUTER, 1996, 29 (06) : 101 - 104
  • [5] PUBLIC KEY CRYPTOGRAPHY
    SMITH, J
    BYTE, 1983, 8 (01): : 198 - &
  • [6] A new public key cryptography using Mq matrix
    Naseri, Azadeh Ramezanpour
    Abbasi, Ahmad
    Atani, Reza Ebrahimi
    JOURNAL OF MATHEMATICAL MODELING, 2023, 11 (04): : 681 - 693
  • [7] Password-only authenticated key establishment protocol without public key cryptography
    Laih, CS
    Ding, L
    Huang, YM
    ELECTRONICS LETTERS, 2005, 41 (04) : 185 - 186
  • [8] FawkesCoin: A Cryptocurrency Without Public-Key Cryptography (Transcript of Discussion)
    Bonneau, Joseph
    SECURITY PROTOCOLS XXII, 2014, 8809 : 359 - 370
  • [9] Demystifying public key cryptography
    Wasilewski, T.
    CED (Denver, CO), 22 (05):
  • [10] Background on public key cryptography
    GROUP-BASED CRYPTOGRAPHY, 2008, : 3 - 7