A model of hierarchical key assignment scheme with CRT

被引:0
|
作者
Zhao, Jing [1 ]
Zhang, Zhigang [1 ]
Xu, Maozhi [2 ]
机构
[1] Univ Sci & Technol Beijing, Dept Mech & Math, Beijing 100083, Peoples R China
[2] Peking Univ, Dept Informat Sci, Beijing 100871, Peoples R China
关键词
D O I
10.1109/CIS.2007.42
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A model of the hierarchical key assignment scheme is established in this paper, which can be applied with any one-way function. With the scheme, the users in the system are divided into several groups according to their predecessors and have a parameter with the group. Applied with CRT, a user key is bounded with its ID in the scheme. By sharing a parameter within the group, the scheme will use less space for parameters. Also, the scheme model is able to meet the optimal dynamic control property. Together with the security, dynamic and complexity analysis of the scheme model, this paper also includes an application example of the model with the discrete logarithm.
引用
下载
收藏
页码:815 / +
页数:2
相关论文
共 50 条
  • [1] A Model of Hierarchical Key Assignment Scheme
    ZHANG Zhigang~ 1
    2. School of Mathematical Science
    Wuhan University Journal of Natural Sciences, 2006, (06) : 1597 - 1600
  • [2] Cryptographic key assignment scheme for hierarchical access control
    Wu, TC
    Chang, CC
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2001, 16 (01): : 25 - 28
  • [3] Efficient date-constraint hierarchical key assignment scheme
    Lee, WB
    Li, JH
    Dow, CR
    SAM '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2005, : 51 - 57
  • [4] Efficient time-bound hierarchical key assignment scheme
    Chien, HY
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2004, 16 (10)
  • [5] An Improved Time-Bound Hierarchical Key Assignment Scheme
    Xu, Qingyu
    He, Mingxing
    Harn, Lein
    2008 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, VOLS 1-3, PROCEEDINGS, 2008, : 1489 - +
  • [6] A Hierarchical Key Assignment Scheme: A Unified Approach for Scalability and Efficiency
    Celikbilek, Ibrahim
    Celiktas, Baris
    Ozdemir, Enver
    IEEE ACCESS, 2024, 12 : 70568 - 70580
  • [7] Enforcing the security of a time-bound hierarchical key assignment scheme
    De Santis, Alfredo
    Ferrara, Anna Lisa
    Masucci, Barbara
    INFORMATION SCIENCES, 2006, 176 (12) : 1684 - 1694
  • [8] An Efficient Solution for Time-Bound Hierarchical Key Assignment Scheme
    Pan, Jeng-Shyang
    Wu, Tsu-Yang
    Chen, Chien-Ming
    Wang, Eric Ke
    GENETIC AND EVOLUTIONARY COMPUTING, VOL II, 2016, 388 : 3 - 9
  • [9] Security Analysis of A Time-bound Hierarchical Key Assignment Scheme
    Pan, Jeng-Shyang
    Wu, Tsu-Yang
    Chen, Chien-Ming
    Wang, Eric Ke
    2015 INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP), 2015, : 203 - 206
  • [10] A secure and efficient time-bound hierarchical key assignment scheme
    Chien, Hung-Yu
    Tang, Yuan-Liang
    Chen, Ying-Lun
    IMECS 2007: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2007, : 371 - +