Abstract
A model of the hierarchical key assignment scheme is approached in this paper, which can be used with any cryptography algorithm. Besides, the optimal dynamic control property of a hierarchical key assignment scheme will be defined in this paper. Also, our scheme model will meet this property.
Similar content being viewed by others
References
Akl S G, Taylor P D. Cryptographic Solution to a Problem of Access Control in a Hierarchy [J].ACM Transactions on Computer System, 1983,3(1):239–247.
Lin C H, Lee W, Ho Y K. An Efficient Hierarchical Key Management Scheme Using Symmetric Encryptions [C]//Proceedings of the 19th International Conference on Advanced Information Networking and Applications. Taipei, March 28–30,2005: 399–402.
Tang Q, Mitchell C J. Comments on a Cryptographic Key Assignment Scheme [J].Computer Standards & Interfaces, 2005,27:323–326.
Chen T S, Huang J Y. A Novel Key Management Scheme for Dynamic Access Control in a User Hierarchy [J].Applied Mathematics and Computation, 2005,162:339–351.
Kuo F H, Shen V R, Chen T S,et al. Cryptographic Key Assignment Scheme for Dynamic Access Control in a User Hierarchy [J].IEE Proc Computers & Digital Techniques, 1999,146(5):235–240.
Chen T S, Huang G S, Tasi C C,et al, An Improvement of Cryptographic Key Assignment Scheme in a User Hierarchy [C]//Proceedings of IEEE Tencon '02. Beijing, October 28–31, 2002: 133–136.
Mao Wenbo.Modern Cryptography: Theory and Practice [M]. Beijing: Electronics Industry Press, 2004 (Ch).
Chen T S, Huang K H, Chung Y F. Modified Cryptographic Key Assignment Scheme for Overcoming the Incorrectness of the CHW Scheme [C]//Proceedings of the 2004IEEE International Conference on E-Technology, E-Commerce and E-Service (EEE '04). Taipei March 29–31, 2004: 569–572.
Yi Xun. Security of Chien's Efficient Time-Bound Hierarchical Key Assignment Scheme [J].IEEE Transactions on Knowledge and Data Engineering, 2005,17(9):1298–1299.
Darrel H, Scott M A V.Guide to Elliptic Curve Cryptography [M]. Beijing: Electronics Industry Press, 2005 (Ch).
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation item: Supported by the National Natural Science Foundation of China (70271068)
Biography: ZHANG Zhigang (1963-), male, Associate professor, research direction: applied mathematics and computer application.
Rights and permissions
About this article
Cite this article
Zhigang, Z., Jing, Z. & Maozhi, X. A model of hierarchical key assignment scheme. Wuhan Univ. J. Nat. Sci. 11, 1597–1600 (2006). https://doi.org/10.1007/BF02831829
Received:
Issue Date:
DOI: https://doi.org/10.1007/BF02831829