A Robust Dynamic Access Control Scheme in a User Hierarchy Based on One-Way Hash Functions

被引:3
|
作者
Chuang, Yu-Hao [1 ]
Hsu, Chien-Lung [1 ,2 ]
机构
[1] Chang Gung Univ, Dept Informat Management, Gueishan, Taiwan
[2] Chang Crung Univ, HARC, Gueishan, Taiwan
来源
JOURNAL OF INTERNET TECHNOLOGY | 2014年 / 15卷 / 02期
关键词
Access control; One-Way hash function; Cryptographic key assignment scheme; Dynamic access control; KEY ASSIGNMENT SCHEME; PROTOCOL;
D O I
10.6138/JIT.2014.15.2.05
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A dynamic access control scheme can be used to improve security and privacy protection for some emerging Internet technologies since it can provide secure privilege management for accessing information resources on the Internet. In 2004, Yang and Li introduced an access control scheme based on one-way hash function for using finite number of keys and a few public hash functions to solve the dynamic access control problem such as adding, deleting or changing the relationship between nodes. This paper, however, found that users can overstep his authority to access unauthorized information in Yang and Li's scheme, which violates their security claims. We further proposed a robust dynamic access control scheme to eliminate such kind of the attack.
引用
收藏
页码:197 / 201
页数:5
相关论文
共 50 条
  • [21] Foundations of Non-malleable Hash and One-Way Functions
    Boldyreva, Alexandra
    Cash, David
    Fischlin, Marc
    Warinschi, Bogdan
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2009, 2009, 5912 : 524 - +
  • [22] Universal One-Way Hash Functions via Inaccessible Entropy
    Haitner, Iftach
    Holenstein, Thomas
    Reingold, Omer
    Vadhan, Salil
    Wee, Hoeteck
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2010, 2010, 6110 : 616 - 637
  • [23] A new electronic traveler's check scheme based on one-way hash function
    Liaw, Horng-Twu
    Lin, Jiann-Fu
    Wu, Wei-Chen
    ELECTRONIC COMMERCE RESEARCH AND APPLICATIONS, 2007, 6 (04) : 499 - 508
  • [24] A new public key certificate revocation scheme based on one-way hash chain
    Li, JF
    Zhu, YF
    Pan, H
    Wei, DW
    ADVANCES IN WEB-AGE INFORMATION MANAGEMENT, PROCEEDINGS, 2005, 3739 : 670 - 675
  • [25] AN optimized LKH scheme based on one-way hash function for secure group communications
    Kang Qiao-Yan
    Meng Xiang-Ru
    Wang Jian-Feng
    2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2006, : 1107 - +
  • [26] Signature scheme based on discrete logarithm without using one-way hash function
    Shao, ZH
    ELECTRONICS LETTERS, 1998, 34 (11) : 1079 - 1080
  • [27] Hierarchical key establishment protocols based on secure keyed one-way hash functions
    Ku, WC
    Wang, SD
    TWELFTH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN-12), PROCEEDINGS, 1998, : 162 - 167
  • [28] A new conic curve digital signature scheme with message recovery and without one-way hash functions
    Tahat, Nedal
    ANNALS OF THE UNIVERSITY OF CRAIOVA-MATHEMATICS AND COMPUTER SCIENCE SERIES, 2013, 40 (02): : 148 - 153
  • [29] Security of robust generalized MQV key agreement protocol without using one-way hash functions
    Shao, ZH
    COMPUTER STANDARDS & INTERFACES, 2003, 25 (05) : 431 - 436
  • [30] A novel key management scheme for dynamic access control in a. user hierarchy
    Chen, TS
    Huang, JY
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 162 (01) : 339 - 351