期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
A practical and dynamic key management scheme for a user hierarchy 被引量:2
1
作者 JENG Fuh-gwo WANG Chung-ming 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第3期296-301,共6页
In this paper, we propose a practical and dynamic key management scheme based on the Rabin public key system and a set of matrices with canonical matrix multiplication to solve the access control problem in an arbitra... In this paper, we propose a practical and dynamic key management scheme based on the Rabin public key system and a set of matrices with canonical matrix multiplication to solve the access control problem in an arbitrary partially ordered user hierarchy. The advantage is in ensuring that the security class in the higher level can derive any of its successor’s secret keys directly and efficiently and show it is dynamic while a new security class is added into or a class is removed from the hierarchy. Even the ex-member problem can be solved efficiently. Moreover, any user can freely change its own key for some security reasons. 展开更多
关键词 user hierarchy Key management Rabin public key Matrix multiplication
下载PDF
An Efficient Key Assignment Scheme Based on One—Way Hash Function in a User Hierarchy 被引量:3
2
作者 Tzer-ShyongChen Yu-FangChung 《Journal of Computer Science & Technology》 SCIE EI CSCD 2003年第2期210-213,共4页
In order to solve the problems resulted from dynamic access control in a userhierarchy, a cryptographic key assignment scheme is proposed by Prof. Lin to promote the performingability and to simplify the procedure. Ho... In order to solve the problems resulted from dynamic access control in a userhierarchy, a cryptographic key assignment scheme is proposed by Prof. Lin to promote the performingability and to simplify the procedure. However, it may cause the security in danger as the userchanges his secret key; besides, some secret keys may be disclosed due to the unsuitable selectionof the security classes' identities. Through setting up a one-way hash function onto Lin's scheme,the proposed modification can greatly improve the security of Lin's scheme. 展开更多
关键词 cryptography access control cryptographic key assignment one-way hashfunction user hierarchy
原文传递
A Model of Hierarchical Key Assignment Scheme 被引量:1
3
作者 ZHANG Zhigang ZHAO Jing XU Maozhi 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1597-1600,共4页
A model of the hierarchical key assignment scheme is approached in this paper, which can be used with any cryptography algorithm. Besides, the optimal dynamic control property of a hierarchical key assignment scheme w... A model of the hierarchical key assignment scheme is approached in this paper, which can be used with any cryptography algorithm. Besides, the optimal dynamic control property of a hierarchical key assignment scheme will be defined in this paper. Also, our scheme model will meet this property. 展开更多
关键词 user hierarchy access control key assignment CRYPTOGRAPHY multilevel data security
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部