A model of hierarchical key assignment scheme with CRT

被引:0
|
作者
Zhao, Jing [1 ]
Zhang, Zhigang [1 ]
Xu, Maozhi [2 ]
机构
[1] Univ Sci & Technol Beijing, Dept Mech & Math, Beijing 100083, Peoples R China
[2] Peking Univ, Dept Informat Sci, Beijing 100871, Peoples R China
关键词
D O I
10.1109/CIS.2007.42
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A model of the hierarchical key assignment scheme is established in this paper, which can be applied with any one-way function. With the scheme, the users in the system are divided into several groups according to their predecessors and have a parameter with the group. Applied with CRT, a user key is bounded with its ID in the scheme. By sharing a parameter within the group, the scheme will use less space for parameters. Also, the scheme model is able to meet the optimal dynamic control property. Together with the security, dynamic and complexity analysis of the scheme model, this paper also includes an application example of the model with the discrete logarithm.
引用
下载
收藏
页码:815 / +
页数:2
相关论文
共 50 条
  • [21] Comments on a cryptographic key assignment scheme
    Tang, Q
    Mitchell, CJ
    COMPUTER STANDARDS & INTERFACES, 2005, 27 (03) : 323 - 326
  • [22] RETRACTED: A Novel Hierarchical Key Assignment Scheme for Data Access Control in IoT (Retracted Article)
    Li, Xiaoyu
    Ye, Min
    Chen, Jiahui
    Chen, Jianhui
    Chen, Yeh-Cheng
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [23] Hierarchical key assignment without public-key cryptography
    Lin, CH
    COMPUTERS & SECURITY, 2001, 20 (07) : 612 - 619
  • [24] A hierarchical key-insulated signature scheme in the CA trust model
    Le, ZY
    Yi, OY
    Ford, J
    Makedon, F
    INFORMATION SECURITY, PROCEEDINGS, 2004, 3225 : 280 - 291
  • [25] A Collusion-Free Key Assignment Scheme for Hierarchical Access Control Using Recursive Hash Chains
    Imaizumi, Shoko
    2013 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2013, : 445 - 448
  • [26] Key Indistinguishability versus Strong Key Indistinguishability for Hierarchical Key Assignment Schemes
    Castiglione, Arcangelo
    De Santis, Alfredo
    Masucci, Barbara
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (04) : 451 - 460
  • [27] Cryptographic key assignment scheme for overcoming the incorrectness of the CHW scheme
    Wen, JH
    Sheu, JS
    Chen, TS
    IEE PROCEEDINGS-COMMUNICATIONS, 2001, 148 (04): : 260 - 264
  • [28] A hierarchical key management scheme for MANET
    Sun Bin
    Yu Bin
    2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2006, : 822 - +
  • [29] Cryptanalysis of YCN key assignment scheme in a hierarchy
    Hwang, MS
    INFORMATION PROCESSING LETTERS, 2000, 73 (3-4) : 97 - 101
  • [30] Multiple Assignment Secret Sharing Scheme Using Hierarchical Threshold Scheme
    Tochikubo, Kouya
    2017 12TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2017, : 456 - 461