A Robust Dynamic Access Control Scheme in a User Hierarchy Based on One-Way Hash Functions

被引:3
|
作者
Chuang, Yu-Hao [1 ]
Hsu, Chien-Lung [1 ,2 ]
机构
[1] Chang Gung Univ, Dept Informat Management, Gueishan, Taiwan
[2] Chang Crung Univ, HARC, Gueishan, Taiwan
来源
JOURNAL OF INTERNET TECHNOLOGY | 2014年 / 15卷 / 02期
关键词
Access control; One-Way hash function; Cryptographic key assignment scheme; Dynamic access control; KEY ASSIGNMENT SCHEME; PROTOCOL;
D O I
10.6138/JIT.2014.15.2.05
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A dynamic access control scheme can be used to improve security and privacy protection for some emerging Internet technologies since it can provide secure privilege management for accessing information resources on the Internet. In 2004, Yang and Li introduced an access control scheme based on one-way hash function for using finite number of keys and a few public hash functions to solve the dynamic access control problem such as adding, deleting or changing the relationship between nodes. This paper, however, found that users can overstep his authority to access unauthorized information in Yang and Li's scheme, which violates their security claims. We further proposed a robust dynamic access control scheme to eliminate such kind of the attack.
引用
收藏
页码:197 / 201
页数:5
相关论文
共 50 条
  • [41] AN AUTHENTICATION-COMBINED ACCESS-CONTROL SCHEME USING A ONE-WAY FUNCTION
    WU, TC
    CHANG, CC
    YEH, YS
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 1994, 27 (05) : 63 - 70
  • [42] Keyed one-way Hash function construction based on the chaotic dynamic S-Box
    Guo Xian-Feng
    Zhang Jia-Shu
    ACTA PHYSICA SINICA, 2006, 55 (09) : 4442 - 4449
  • [43] Construct message authentication code with one-way hash functions and block ciphers
    Yeh, YS
    Wang, CC
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1999, E82A (02) : 390 - 393
  • [44] New authentication scheme based on a one-way hash function and Diffie-Hellman key exchange
    Yoon, EJ
    Yoo, KY
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2005, 3810 : 147 - 160
  • [45] A Multi-User Collaborative Access Control Scheme Based on New Hash Chain
    Wang, Zetian
    Li, Yunfa
    Liu, Guanxu
    Zhang, Di
    ELECTRONICS, 2023, 12 (08)
  • [46] An Improved Authentication Protocol Based on One-Way Hash Functions and Diffie-Hellman Key Exchange
    Holbl, Marko
    Welzer, Tatjana
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 894 - 898
  • [47] Pseudorandom Generators based on one-way functions
    Gao, Shujing
    Song, Tingqiang
    Zhang, Wei
    Applied Decisions in Area of Mechanical Engineering and Industrial Manufacturing, 2014, 577 : 820 - 823
  • [48] Cryptographic implementation for dynamic access control in a user hierarchy
    Tsai, Hui-Min
    Chang, Chin-Chen
    Computers and Security, 1995, 14 (02): : 159 - 166
  • [49] A publicly verifiable authenticated encryption scheme without using one-way hash function
    Xie, Shi-Y
    Xu, Bing
    PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 2511 - 2514
  • [50] Constructina a one-way hash function based on the unified chaotic system
    Long Min
    Peng Fei
    Chen Guan-Rong
    CHINESE PHYSICS B, 2008, 17 (10) : 3588 - 3595