A Robust Dynamic Access Control Scheme in a User Hierarchy Based on One-Way Hash Functions

被引:3
|
作者
Chuang, Yu-Hao [1 ]
Hsu, Chien-Lung [1 ,2 ]
机构
[1] Chang Gung Univ, Dept Informat Management, Gueishan, Taiwan
[2] Chang Crung Univ, HARC, Gueishan, Taiwan
来源
JOURNAL OF INTERNET TECHNOLOGY | 2014年 / 15卷 / 02期
关键词
Access control; One-Way hash function; Cryptographic key assignment scheme; Dynamic access control; KEY ASSIGNMENT SCHEME; PROTOCOL;
D O I
10.6138/JIT.2014.15.2.05
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A dynamic access control scheme can be used to improve security and privacy protection for some emerging Internet technologies since it can provide secure privilege management for accessing information resources on the Internet. In 2004, Yang and Li introduced an access control scheme based on one-way hash function for using finite number of keys and a few public hash functions to solve the dynamic access control problem such as adding, deleting or changing the relationship between nodes. This paper, however, found that users can overstep his authority to access unauthorized information in Yang and Li's scheme, which violates their security claims. We further proposed a robust dynamic access control scheme to eliminate such kind of the attack.
引用
收藏
页码:197 / 201
页数:5
相关论文
共 50 条
  • [31] How to construct universal one-way hash functions of order r
    Hong, D
    Sung, J
    Hong, S
    Lee, S
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2005, PROCEEDINGS, 2005, 3797 : 63 - 76
  • [32] A technique for boosting the security of cryptographic systems with one-way hash functions
    Koshiba, T
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC'99, 2000, 1787 : 76 - 81
  • [33] Construction of universal one-way hash functions: Tree hashing revisited
    Sarkar, Palash
    DISCRETE APPLIED MATHEMATICS, 2007, 155 (16) : 2174 - 2180
  • [34] Authenticated key agreement without using one-way hash functions
    Harn, L
    Lin, HY
    ELECTRONICS LETTERS, 2001, 37 (10) : 629 - 630
  • [35] A Neighbor Information and One-way Hash Chain Based Filtering Scheme in Wireless Sensor Networks
    Liu, Zhixiong
    Liu, Huafu
    AD HOC & SENSOR WIRELESS NETWORKS, 2017, 39 (1-4) : 285 - 311
  • [36] Signature scheme based on discrete logarithm without using one-way hash-function
    Yeun, CY
    Mitchell, CJ
    Ng, SL
    ELECTRONICS LETTERS, 1998, 34 (24) : 2329 - 2330
  • [37] A token-based software license protection framework using one-way hash functions
    Wang, LZ
    Bauer, M
    Perry, M
    EEE '05: Proceedings of the 2005 International Conference on E-Business, Enterprise Information Systems, E-Government, and Outsourcing, 2005, : 134 - 139
  • [39] Finding collisions on a one-way street: Can secure hash functions be based on general assumptions?
    Simon, DR
    ADVANCES IN CRYPTOLOGY - EUROCRYPT '98, 1998, 1403 : 334 - 345
  • [40] One-way Hash function based on chaotic neural network
    Liu Guang-Jie
    Shan Liang
    Dai Yue-Wei
    Sun Jin-Sheng
    Wang Zhi-Quan
    ACTA PHYSICA SINICA, 2006, 55 (11) : 5688 - 5693