A model of hierarchical key assignment scheme with CRT

被引:0
|
作者
Zhao, Jing [1 ]
Zhang, Zhigang [1 ]
Xu, Maozhi [2 ]
机构
[1] Univ Sci & Technol Beijing, Dept Mech & Math, Beijing 100083, Peoples R China
[2] Peking Univ, Dept Informat Sci, Beijing 100871, Peoples R China
来源
CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS | 2007年
关键词
D O I
10.1109/CIS.2007.42
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A model of the hierarchical key assignment scheme is established in this paper, which can be applied with any one-way function. With the scheme, the users in the system are divided into several groups according to their predecessors and have a parameter with the group. Applied with CRT, a user key is bounded with its ID in the scheme. By sharing a parameter within the group, the scheme will use less space for parameters. Also, the scheme model is able to meet the optimal dynamic control property. Together with the security, dynamic and complexity analysis of the scheme model, this paper also includes an application example of the model with the discrete logarithm.
引用
收藏
页码:815 / +
页数:2
相关论文
共 50 条
  • [41] A practical time bound hierarchical key scheme
    Liu, Jiqiang
    Zhong, Sheng
    International Journal of Innovative Computing, Information and Control, 2009, 5 (10): : 3241 - 3247
  • [42] Efficient key assignment scheme for mobile agent systems
    Chew, WM
    Chi, CH
    Li, TY
    15TH IEEE INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2003, : 338 - 345
  • [43] An efficient key assignment scheme for access control in a hierarchy
    Vadnala, Praveen Kumar
    Mathuria, Anish
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2006, 4332 : 205 - +
  • [44] Correctness of CHW cryptographic key assignment scheme in a hierarchy
    Tan, KJ
    Gu, SJ
    Zhu, HW
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1999, 146 (04): : 217 - 218
  • [45] A cryptographic key assignment scheme in a hierarchy for access control
    Hwang, MS
    MATHEMATICAL AND COMPUTER MODELLING, 1997, 26 (02) : 27 - 31
  • [46] An improvement of cryptographic key assignment scheme in a user hierarchy
    Chen, TS
    Huang, GS
    Tasi, CC
    Chang, NT
    2002 IEEE REGION 10 CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND POWER ENGINEERING, VOLS I-III, PROCEEDINGS, 2002, : 133 - 136
  • [47] Extension of CHW cryptographic key assignment scheme in a hierarchy
    Hwang, MS
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1999, 146 (04): : 219 - 219
  • [48] A DYNAMIC CRYPTOGRAPHIC KEY ASSIGNMENT SCHEME IN A TREE STRUCTURE
    LIAW, HT
    WANG, SJ
    LEI, CL
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 1993, 25 (06) : 109 - 114
  • [49] Channel assignment scheme for virtual hierarchical wireless mesh networks
    Hu, Zhiyuan
    Su, Jiayong
    Guo, Jianding
    Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics, 2010, 36 (09): : 1080 - 1083
  • [50] A layer assignment and resource reservation scheme for hierarchical cell structures
    Zander, R
    Karlsson, JM
    NETWORKING 2004: NETWORKING TECHNOLOGIES, SERVICES, AND PROTOCOLS; PERFORMANCE OF COMPUTER AND COMMUNICATION NETWORKS; MOBILE AND WIRELESS COMMUNICATIONS, 2004, 3042 : 1508 - 1513