Time-Bound Hierarchical Key Assignment: An Overview

被引:3
|
作者
Zhu, Wen Tao [1 ]
Deng, Robert H. [2 ]
Zhou, Jianying [3 ]
Rao, Feng [3 ]
机构
[1] Chinese Acad Sci, Grad Univ, State Key Lab Informat Secur, Beijing 100864, Peoples R China
[2] Singapore Management Univ, Sch Informat Syst, Singapore, Singapore
[3] Inst Infocomm Res, Singapore, Singapore
来源
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS | 2010年 / E93D卷 / 05期
关键词
information security; access control; time-bound hierarchical cryptographic key management; ACCESS-CONTROL; SCHEME; SECURITY;
D O I
10.1587/transinf.E93.D.1044
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The access privileges in distributed systems can be effectively organized as a partial-order hierarchy that consists of distinct security classes, and the access rights are often designated with certain temporal restrictions. The time-bound hierarchical key assignment problem is to assign distinct cryptographic keys to distinct security classes according to their privileges so that users from a higher class can use their class key to derive the keys of lower classes, and these keys are time-variant with respect to sequentially allocated temporal units called time slots. In this paper, we present the involved principle, survey the state of the art, and particularly, look into two representative approaches to time-bound hierarchical key assignment for in-depth case studies.
引用
收藏
页码:1044 / 1052
页数:9
相关论文
共 50 条
  • [1] An Improved Time-Bound Hierarchical Key Assignment Scheme
    Xu, Qingyu
    He, Mingxing
    Harn, Lein
    2008 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, VOLS 1-3, PROCEEDINGS, 2008, : 1489 - +
  • [2] A note on time-bound hierarchical key assignment schemes
    Ateniese, Giuseppe
    De Santis, Alfredo
    Ferrara, Anna Lisa
    Masucci, Barbara
    INFORMATION PROCESSING LETTERS, 2013, 113 (5-6) : 151 - 155
  • [3] Efficient time-bound hierarchical key assignment scheme
    Chien, HY
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2004, 16 (10)
  • [4] A secure and efficient time-bound hierarchical key assignment scheme
    Chien, Hung-Yu
    Tang, Yuan-Liang
    Chen, Ying-Lun
    IMECS 2007: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2007, : 371 - +
  • [5] Enforcing the security of a time-bound hierarchical key assignment scheme
    De Santis, Alfredo
    Ferrara, Anna Lisa
    Masucci, Barbara
    INFORMATION SCIENCES, 2006, 176 (12) : 1684 - 1694
  • [6] Security Analysis of A Time-bound Hierarchical Key Assignment Scheme
    Pan, Jeng-Shyang
    Wu, Tsu-Yang
    Chen, Chien-Ming
    Wang, Eric Ke
    2015 INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP), 2015, : 203 - 206
  • [7] An Efficient Solution for Time-Bound Hierarchical Key Assignment Scheme
    Pan, Jeng-Shyang
    Wu, Tsu-Yang
    Chen, Chien-Ming
    Wang, Eric Ke
    GENETIC AND EVOLUTIONARY COMPUTING, VOL II, 2016, 388 : 3 - 9
  • [8] A Novel Time-bound Hierarchical Key Assignment Scheme for Mobile Agent
    Liu, Chia-Hui
    Chung, Yu-Fang
    Jhuo, Jin-De
    Chen, Tzer-Shyong
    Wang, Sheng-De
    INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS (IMECS 2010), VOLS I-III, 2010, : 258 - +
  • [9] Provably-Secure Time-Bound Hierarchical Key Assignment Schemes
    Giuseppe Ateniese
    Alfredo De Santis
    Anna Lisa Ferrara
    Barbara Masucci
    Journal of Cryptology, 2012, 25 : 243 - 270
  • [10] Applying Time-Bound Hierarchical Key Assignment in Wireless Sensor Networks
    Zhu, Wen Tao
    Deng, Robert H.
    Zhou, Jianying
    Bao, Feng
    INFORMATION AND COMMUNICATIONS SECURITY, 2011, 7043 : 306 - +