Modified cryptographic key assignment scheme for a group-oriented user hierarchy

被引:0
|
作者
Shen, VRL
Chen, TS
Lai, FP
机构
关键词
cryptographic key assignment; access control; group hierarchy;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A modified cryptographic key assignment scheme for the dynamic access control in a group-oriented user hierarchy is presented. In the partially ordered set (poset, for short) user hierarchy (G(j) less than or equal to G(i)) embedded in a group-oriented (t, n) threshold cryptosystem, the source group G(i) has higher security clearance to access the information items held in the target group G(j). If a target group G(j) has multiple paths reachable from a source group G(i), we must choose the least cost path to rapidly resolve the dynamic access control problem. Furthermore, multiple threshold values are also considered in order to meet the different security requirements.
引用
收藏
页码:2032 / 2034
页数:3
相关论文
共 50 条
  • [21] Group-oriented authentication mechanism with key exchange
    Chang, YS
    Wu, TC
    [J]. COMPUTER COMMUNICATIONS, 1998, 21 (05) : 485 - 497
  • [22] Cryptographic key assignment scheme for overcoming the incorrectness of the CHW scheme
    Wen, JH
    Sheu, JS
    Chen, TS
    [J]. IEE PROCEEDINGS-COMMUNICATIONS, 2001, 148 (04): : 260 - 264
  • [23] Cryptographic key assignment scheme for hierarchical access control
    Wu, TC
    Chang, CC
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2001, 16 (01): : 25 - 28
  • [24] A DYNAMIC CRYPTOGRAPHIC KEY ASSIGNMENT SCHEME IN A TREE STRUCTURE
    LIAW, HT
    WANG, SJ
    LEI, CL
    [J]. COMPUTERS & MATHEMATICS WITH APPLICATIONS, 1993, 25 (06) : 109 - 114
  • [25] A group-oriented anonymous signature scheme with subliminal channel
    Zhang, JH
    Zou, JC
    Wang, YM
    [J]. 2005 IEEE NETWORKING, SENSING AND CONTROL PROCEEDINGS, 2005, : 49 - 53
  • [26] Identity based group-oriented undeniable signature scheme
    Guo, XY
    Tang, CJ
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (02) : 1448 - 1457
  • [27] Cryptanalysis of YCN key assignment scheme in a hierarchy
    Hwang, MS
    [J]. INFORMATION PROCESSING LETTERS, 2000, 73 (3-4) : 97 - 101
  • [28] A NEW GROUP-ORIENTED PUBLICLY VERIABLETHRESHOLD SIGNCRYPTION SCHEME
    Chen Shangdi
    Bian Guangxu
    [J]. Journal of Electronics(China), 2013, 30 (06) : 567 - 573
  • [29] Efficient Hierarchical Group-Oriented Key Establishment and Decryption
    Eskeland, Sigurd
    Oleshchuk, Vladimir
    [J]. FOURTH INTERNATIONAL SYMPOSIUM ON INFORMATION ASSURANCE AND SECURITY, PROCEEDINGS, 2008, : 67 - 72
  • [30] Recursive protocol for group-oriented authentication with key distribution
    Wu, Tzong-Chen
    Huang, Thsia-Tzu
    Hsu, Chien-Lung
    Tsai, Kuo-Yu
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2008, 81 (07) : 1227 - 1239