Cryptanalysis of YCN key assignment scheme in a hierarchy

被引:17
|
作者
Hwang, MS [1 ]
机构
[1] Chaoyang Univ Technol, Dept Informat Management, Wufeng 413, Taichung Countr, Taiwan
关键词
cryptography; data security; user hierarchy;
D O I
10.1016/S0020-0190(00)00013-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, we present counter-evidence to point out that the YCN cryptographic key assignment scheme in a hierarchy is not secure. (C) 2000 Published by Elsevier Science B.V. All rights reserved.
引用
下载
收藏
页码:97 / 101
页数:5
相关论文
共 50 条
  • [21] Cryptanalysis and Improvement of a Chaotic Key Agreement Scheme
    Guo, Xianfeng
    Wang, Xiaomin
    2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 133 - 136
  • [22] Cryptanalysis of Stickel's key exchange scheme
    Shpilrain, Vladimir
    COMPUTER SCIENCE - THEORY AND APPLICATIONS, 2008, 5010 : 283 - 288
  • [23] Cryptanalysis of LHL-key authentication scheme
    Peinado, A
    APPLIED MATHEMATICS AND COMPUTATION, 2004, 152 (03) : 721 - 724
  • [24] An efficient key assignment scheme based on one-way hash function in a user hierarchy
    Chen, TS
    Chung, YF
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2003, 18 (02) : 210 - 213
  • [25] An efficient key assignment scheme based on one-way hash function in a user hierarchy
    Chen Tzer-Shyong
    Chung Yu-Fang
    Journal of Computer Science and Technology, 2003, 18 : 210 - 213
  • [26] Security of Tzeng's time-bound key assignment scheme for access control in a hierarchy
    Yi, X
    Ye, YM
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2003, 15 (04) : 1054 - 1055
  • [27] Cryptanalysis of a simple key assignment for access control based on polynomial
    Lee, Cheng-Chi
    Lai, Yan-Ming
    Hsiao, Chin-Sung
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2013, 18 (04) : 215 - 218
  • [28] Cryptanalysis of a key exchange scheme based on block matrices
    Gonzalez Vasco, Maria Isabel
    Perez del Pozo, Angel L.
    Taborda Duarte, Pedro
    Villar, Jorge L.
    INFORMATION SCIENCES, 2014, 276 : 319 - 331
  • [30] Cryptanalysis of an additively homomorphic public key encryption scheme
    Hong, Zhiyong
    Zhou, Liguo
    Zhan, Yu
    Liu, Chengdong
    Wang, Baocang
    COMPUTER STANDARDS & INTERFACES, 2022, 82