期刊文献+

A Model of Hierarchical Key Assignment Scheme 被引量:1

A Model of Hierarchical Key Assignment Scheme
下载PDF
导出
摘要 A model of the hierarchical key assignment scheme is approached in this paper, which can be used with any cryptography algorithm. Besides, the optimal dynamic control property of a hierarchical key assignment scheme will be defined in this paper. Also, our scheme model will meet this property. A model of the hierarchical key assignment scheme is approached in this paper, which can be used with any cryptography algorithm. Besides, the optimal dynamic control property of a hierarchical key assignment scheme will be defined in this paper. Also, our scheme model will meet this property.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1597-1600,共4页 武汉大学学报(自然科学英文版)
基金 Supported by the National Natural Science Foun-dation of China (70271068)
关键词 user hierarchy access control key assignment CRYPTOGRAPHY multilevel data security user hierarchy access control key assignment cryptography multilevel data security
  • 相关文献

参考文献10

  • 1Tang,Q,Mitchell,C J.Comments on a Cryptographic Key Assignment Scheme[].Computers and Standards.2005
  • 2Chen,T S,Huang,J Y.A Novel Key Management Scheme for Dynamic Access Control in a User Hierarchy[].Journal of Applied Mathematics.2005
  • 3Kuo,F H,Shen,V R,Chen,T S.Cryptographic Key Assignment Scheme for Dynamic Access Control in a User Hierarchy[].IEE Proceedings Computers and Digital Techniques.1999
  • 4Wenbo,Mao. Modern Cryptography: Theory and Practice . 2004
  • 5Xun,Yi.Security of Chien’s Efficient Time-Bound Hierarchical Key Assignment Scheme[].IEEE Transactions on Knowledge and Data Engineering.2005
  • 6Darrel,H,Scott,M A V. Guide to Elliptic Curve Cryptography . 2005
  • 7Akl S G,Taylor P D.Cryptographic solution to a problem of ac-cess control in a hierarchy[].ACM Transactions on ComputerSystem.1983
  • 8Lin C H,Lee W,Ho Y K.An Efficient Hierarchical Key Management Scheme Using Symmetric Encryptions[].Proceedings of theth International Conference on Ad- vanced Information Networking and Applications.2005
  • 9Chen T S,Huang GS,Tasi C C,et al.AnImprovement of Cryptographic Key Assignment Scheme in a User Hierarchy[].Proceedings of IEEE Tencon’’.2002
  • 10Chen TS,Huang K H,Chung YF.Modified Cryptographic Key Assignment Scheme for Overcoming the Incorrectness of the CHWScheme[].Proceedings of theIEEEIn- ternational Conference on E-Technology E-Commerce and E-Service ( EEE’’).2004

同被引文献6

  • 1金立杰,许春香.基于身份的认证密钥协商协议[J].信息安全与通信保密,2007,29(8):20-22. 被引量:5
  • 2Trusted Computing Group. TCG Specification Architecture Overview [EB/OL].[2005-03-01]. http://www. trusted- computinggroup, org/groups/TCG_ 1_0_ Architecture_ Overview. pdf.
  • 3Boneh D, Franklinm M. Identity-Based Encryption from the Weil Pairing[C]//Proc of CRYPTO'01,2001 : 213-229.
  • 4曹正军,刘木兰.高效可认证组密钥协商协议[C]∥密码学进展-CHINACRYPT'06,2006:32-36.
  • 5Wang Liming, Wu Chuankuru Authenticated Group Key A- greement for Multieast[C]// Proc of the 5th Int'l Conf on Cryptology and Network Security, 2006 : 55-72.
  • 6王朝瑞.图论[M].北京:人民教育出版社,1981.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部