A Robust Dynamic Access Control Scheme in a User Hierarchy Based on One-Way Hash Functions

被引:3
|
作者
Chuang, Yu-Hao [1 ]
Hsu, Chien-Lung [1 ,2 ]
机构
[1] Chang Gung Univ, Dept Informat Management, Gueishan, Taiwan
[2] Chang Crung Univ, HARC, Gueishan, Taiwan
来源
JOURNAL OF INTERNET TECHNOLOGY | 2014年 / 15卷 / 02期
关键词
Access control; One-Way hash function; Cryptographic key assignment scheme; Dynamic access control; KEY ASSIGNMENT SCHEME; PROTOCOL;
D O I
10.6138/JIT.2014.15.2.05
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A dynamic access control scheme can be used to improve security and privacy protection for some emerging Internet technologies since it can provide secure privilege management for accessing information resources on the Internet. In 2004, Yang and Li introduced an access control scheme based on one-way hash function for using finite number of keys and a few public hash functions to solve the dynamic access control problem such as adding, deleting or changing the relationship between nodes. This paper, however, found that users can overstep his authority to access unauthorized information in Yang and Li's scheme, which violates their security claims. We further proposed a robust dynamic access control scheme to eliminate such kind of the attack.
引用
收藏
页码:197 / 201
页数:5
相关论文
共 50 条
  • [1] Access control in a hierarchy using one-way hash functions
    Yang, CG
    Li, C
    COMPUTERS & SECURITY, 2004, 23 (08) : 659 - 664
  • [2] An efficient key assignment scheme based on one-way hash function in a user hierarchy
    Chen, TS
    Chung, YF
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2003, 18 (02) : 210 - 213
  • [3] An efficient key assignment scheme based on one-way hash function in a user hierarchy
    Chen Tzer-Shyong
    Chung Yu-Fang
    Journal of Computer Science and Technology, 2003, 18 : 210 - 213
  • [4] ONE-WAY HASH FUNCTIONS
    SCHNEIER, B
    DR DOBBS JOURNAL, 1991, 16 (09): : 148 - 150
  • [5] A watermarking technique based on one-way hash functions
    Hwang, MS
    Chang, CC
    Hwang, KF
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 1999, 45 (02) : 286 - 294
  • [6] An improved signature scheme without using one-way Hash functions
    Zhang, JH
    Wang, YM
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 170 (02) : 905 - 908
  • [7] An efficient access control scheme in user hierarchy based on polynomial interpolation and hash function
    Das, Ashok Kumar
    Goswami, Adrijit
    Odelu, Vanga
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2014, 12 (02) : 129 - 151
  • [8] One-way hash functions based on iterated chaotic systems
    Peng, Fei
    Qiu, Shui-Sheng
    2007 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEMS; VOL 2: SIGNAL PROCESSING, COMPUTATIONAL INTELLIGENCE, CIRCUITS AND SYSTEMS, 2007, : 1070 - +
  • [9] One-way hash functions with changeable parameters
    Hsieh, TM
    Yeh, YS
    Lin, CH
    Tuan, SH
    INFORMATION SCIENCES, 1999, 118 (1-4) : 223 - 239
  • [10] Non-adaptive Universal One-Way Hash Functions from Arbitrary One-Way Functions
    Mao, Xinyu
    Mazor, Noam
    Zhang, Jiapeng
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2023, PT IV, 2023, 14007 : 502 - 531