New hierarchical assignment without public key cryptography

被引:19
|
作者
Chien, HY [1 ]
Jan, JK
机构
[1] ChaoYang Univ Technol, Dept Informat Management, Taichung 413, Taiwan
[2] Natl Chung Hsing Univ, Inst Comp Sci, Taichung, Taiwan
关键词
cryptography; key assignment;
D O I
10.1016/S0167-4048(03)00613-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The access privileges in many distributed systems can be effectively organized as a hierarchical tree. Distributing distinct cryptographic keys to distinct entities, according to their privileges, provides a good solution to the hierarchical access control problem. Many existing key assignment schemes use public key cryptography, which requires lots of costly public key operations and thus leads to a limited degree of deployment. In this paper, we shall propose a new key assignment protocol that employs only a low cost smart card with little memory to perform simple arithmetic operations. Our approach greatly reduces the computational load and the implementation cost. Compared with Lin's scheme, which is a very efficient scheme without using any public key cryptography, our new scheme further reduces the computational cost by as much as 66% and the quantity of public data by 50%.
引用
收藏
页码:523 / 526
页数:4
相关论文
共 50 条
  • [41] Lattices: A new key for cryptography
    不详
    IEEE MICRO, 1997, 17 (04) : 2 - 2
  • [42] Secure Session Key Sharing Using Public Key Cryptography
    Gupta, Anjali
    Hussain, Muzzammil
    PROCEEDING OF THE THIRD INTERNATIONAL SYMPOSIUM ON WOMEN IN COMPUTING AND INFORMATICS (WCI-2015), 2015, : 573 - 576
  • [43] A new public-key cryptography based on chaotic attractors of neural networks
    Liu, NS
    Guo, DH
    PROGRESS IN INTELLIGENCE COMPUTATION & APPLICATIONS, 2005, : 293 - 300
  • [44] Public key cryptography based on Moufang loops
    Chee, Wing Loon
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (08): : 2411 - 2427
  • [45] PRIVACY, FREEDOM AND PUBLIC-KEY CRYPTOGRAPHY
    RICE, R
    INFORMATION AGE, 1986, 8 (04): : 208 - 214
  • [46] Emerging standards for public-key cryptography
    Kaliski, BS
    LECTURES ON DATA SECURITY: MODERN CRYPTOLOGY IN THEORY AND PRACTICE, 1999, 1561 : 87 - 104
  • [47] Certificateless Public Key Cryptography: A Research Survey
    Sayid, Jacob
    Sayid, Isaac
    Kar, Jayaprakash
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (07): : 103 - 117
  • [48] A Reconfigurable Coprocessor for Public-Key Cryptography
    Su, JianLong
    Wu, Yi
    Bai, Guoqiang
    Wu, Xingjun
    PROCEEDINGS OF 2018 12TH IEEE INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION (ASID), 2018, : 141 - 145
  • [49] Modular Multiplication for Public Key Cryptography on FPGAs
    Abdel-Fattah, Ahmad M.
    El-Din, Ayman M. Bahaa
    Fahmy, Hossam M. A.
    ICCIT: 2009 FOURTH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2009, : 1096 - 1100
  • [50] New architectures for low-cost public key cryptography on RFID tags
    McLoone, M.
    Robshaw, M. J. B.
    2007 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-11, 2007, : 1827 - +