Correctness of CHW cryptographic key assignment scheme in a hierarchy

被引:5
|
作者
Tan, KJ [1 ]
Gu, SJ [1 ]
Zhu, HW [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Elect Engn, Shanghai 200030, Peoples R China
来源
关键词
D O I
10.1049/ip-cdt:19990422
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Two counter-examples point out that a CHW cryptographic key assignment scheme in a hierarchy and its two modified versions are impractical or incorrect.
引用
收藏
页码:217 / 218
页数:2
相关论文
共 50 条
  • [31] DISTRIBUTED ASSIGNMENT OF CRYPTOGRAPHIC KEYS FOR ACCESS-CONTROL IN A HIERARCHY
    SHAO, BM
    HWANG, JJ
    WANG, PC
    COMPUTERS & SECURITY, 1994, 13 (01) : 79 - 84
  • [32] Random key encryption a new cryptographic scheme
    Shafeeq, Muhammad
    Durrani, Mehr Yahya
    Afzal, Ifraseab
    ICIET 2007: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND EMERGING TECHNOLOGIES, 2007, : 59 - +
  • [33] An efficient key assignment scheme based on one-way hash function in a user hierarchy
    Chen, TS
    Chung, YF
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2003, 18 (02) : 210 - 213
  • [34] Cryptographic Extraction and Key Derivation: The HKDF Scheme
    Krawczyk, Hugo
    ADVANCES IN CRYPTOLOGY - CRYPTO 2010, 2010, 6223 : 631 - 648
  • [35] Secured Key Distribution Scheme for Cryptographic Key Management System
    Khaing, Kyawt Kyawt
    Aung, Khin Mi Mi
    FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 481 - 486
  • [36] An efficient key assignment scheme based on one-way hash function in a user hierarchy
    Chen Tzer-Shyong
    Chung Yu-Fang
    Journal of Computer Science and Technology, 2003, 18 : 210 - 213
  • [37] Security of Tzeng's time-bound key assignment scheme for access control in a hierarchy
    Yi, X
    Ye, YM
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2003, 15 (04) : 1054 - 1055
  • [38] Cryptographic key assignment schemes for any access control policy
    De Santis, A
    Ferrara, AL
    Masucci, B
    INFORMATION PROCESSING LETTERS, 2004, 92 (04) : 199 - 205
  • [39] Cryptographic Key Generation Scheme from Cancellable Biometrics
    Sarkar, Arpita
    Singh, Binod Kr
    Bhaumik, Ujjayanta
    PROGRESS IN COMPUTING, ANALYTICS AND NETWORKING, ICCAN 2017, 2018, 710 : 265 - 272
  • [40] Key Assignment Scheme with Authenticated Encryption
    Kandele, Suyash
    Paul, Souradyuti
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2018, 2018 (04) : 150 - 196