A model of hierarchical key assignment scheme with CRT

被引:0
|
作者
Zhao, Jing [1 ]
Zhang, Zhigang [1 ]
Xu, Maozhi [2 ]
机构
[1] Univ Sci & Technol Beijing, Dept Mech & Math, Beijing 100083, Peoples R China
[2] Peking Univ, Dept Informat Sci, Beijing 100871, Peoples R China
关键词
D O I
10.1109/CIS.2007.42
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A model of the hierarchical key assignment scheme is established in this paper, which can be applied with any one-way function. With the scheme, the users in the system are divided into several groups according to their predecessors and have a parameter with the group. Applied with CRT, a user key is bounded with its ID in the scheme. By sharing a parameter within the group, the scheme will use less space for parameters. Also, the scheme model is able to meet the optimal dynamic control property. Together with the security, dynamic and complexity analysis of the scheme model, this paper also includes an application example of the model with the discrete logarithm.
引用
下载
收藏
页码:815 / +
页数:2
相关论文
共 50 条
  • [31] Time-Bound Hierarchical Key Assignment: An Overview
    Zhu, Wen Tao
    Deng, Robert H.
    Zhou, Jianying
    Rao, Feng
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2010, E93D (05): : 1044 - 1052
  • [32] New hierarchical assignment without public key cryptography
    Chien, HY
    Jan, JK
    COMPUTERS & SECURITY, 2003, 22 (06) : 523 - 526
  • [33] Modified cryptographic key assignment scheme for overcoming the incorrectness of the CHW scheme
    Chen, TS
    Huang, KH
    Chung, YF
    APPLIED MATHEMATICS AND COMPUTATION, 2004, 159 (01) : 147 - 155
  • [34] Enforcing non-hierarchical access policies by hierarchical key assignment schemes
    Yeh, Jyh-Haw
    INFORMATION PROCESSING LETTERS, 2009, 110 (02) : 46 - 49
  • [35] Modified cryptographic key assignment scheme for overcoming the incorrectness of the CHW scheme
    Chen, TS
    Huang, KH
    Chung, YF
    2004 IEEE INTERNATIONAL CONFERNECE ON E-TECHNOLOGY, E-COMMERE AND E-SERVICE, PROCEEDINGS, 2004, : 567 - 570
  • [36] A New Efficient Hierarchical Key Agreement Scheme
    Xia, Jingbo
    Yu, Rongwei
    Ai, Xiaochuan
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 319 - +
  • [37] A PRACTICAL TIME BOUND HIERARCHICAL KEY SCHEME
    Liu, Jiqiang
    Zhong, Sheng
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2009, 5 (10A): : 3241 - 3247
  • [38] An Enhanced Hierarchical Key Management Scheme for MANETs
    Elaskily, Mohamed A.
    Kelash, Hamdy M.
    El-sayed, Hala S.
    Faragallah, Osama S.
    WIRELESS PERSONAL COMMUNICATIONS, 2013, 72 (04) : 1783 - 1800
  • [39] A hierarchical key pre-distribution scheme
    Ramkumar, Mahalingam
    Memon, Nasir
    Simha, Rahul
    2005 IEEE INTERNATIONAL CONFERENCE ON ELECTRO/INFORMATION TECHNOLOGY (EIT 2005), 2005, : 212 - 217
  • [40] An Enhanced Hierarchical Key Management Scheme for MANETs
    Mohamed A. Elaskily
    Hamdy M. Kelash
    Hala S. El-sayed
    Osama S. Faragallah
    Wireless Personal Communications, 2013, 72 : 1783 - 1800