Correctness of CHW cryptographic key assignment scheme in a hierarchy

被引:5
|
作者
Tan, KJ [1 ]
Gu, SJ [1 ]
Zhu, HW [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Elect Engn, Shanghai 200030, Peoples R China
来源
关键词
D O I
10.1049/ip-cdt:19990422
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Two counter-examples point out that a CHW cryptographic key assignment scheme in a hierarchy and its two modified versions are impractical or incorrect.
引用
收藏
页码:217 / 218
页数:2
相关论文
共 50 条
  • [41] A Model of Hierarchical Key Assignment Scheme
    ZHANG Zhigang~ 1
    2. School of Mathematical Science
    WuhanUniversityJournalofNaturalSciences, 2006, (06) : 1597 - 1600
  • [42] A Novel Cryptographic Key Exchange Scheme using Resistors
    Lin, Pey-Chang Kent
    Ivanov, Alex
    Johnson, Bradley
    Khatri, Sunil P.
    2011 IEEE 29TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2011, : 451 - 452
  • [43] Computer Proven Correctness of the Rabin Public-Key Scheme
    Buchmann, Johannes
    Kaiser, Markus
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 21, 2007, 21 : 212 - 217
  • [44] Multi-Biometrics Based Cryptographic Key Regeneration Scheme
    Kanade, Sanjay
    Petrovska-Delacretaz, Dijana
    Dorizzi, Bernadette
    2009 IEEE 3RD INTERNATIONAL CONFERENCE ON BIOMETRICS: THEORY, APPLICATIONS AND SYSTEMS, 2009, : 333 - 339
  • [45] The Novel Cryptographic Key Generation and Distribution Scheme for Smart Grid
    Wang, Zhidong
    Liu, Piao
    Lin, Peixia
    Yang, Zhibin
    Liang, Mei
    Zuo, Hanmu
    2015 5TH INTERNATIONAL CONFERENCE ON ELECTRIC UTILITY DEREGULATION AND RESTRUCTURING AND POWER TECHNOLOGIES (DRPT 2015), 2015, : 873 - 875
  • [46] A symmetric neural cryptographic key generation scheme for Iot security
    Arindam Sarkar
    Applied Intelligence, 2023, 53 : 9344 - 9367
  • [47] A symmetric neural cryptographic key generation scheme for Iot security
    Sarkar, Arindam
    APPLIED INTELLIGENCE, 2023, 53 (08) : 9344 - 9367
  • [48] A New Cryptographic Key Generation Scheme Using Psychological Signals
    Akhila, V. A.
    Arunvinodh, C.
    Reshmi, K. C.
    Sakthiprasad, K. M.
    1ST GLOBAL COLLOQUIUM ON RECENT ADVANCEMENTS AND EFFECTUAL RESEARCHES IN ENGINEERING, SCIENCE AND TECHNOLOGY - RAEREST 2016, 2016, 25 : 286 - 292
  • [49] A Scheme for the Generation of Strong Cryptographic Key Pairs based on fCMetrics
    Tahir, Ruhma
    Hu, Huosheng
    Gu, Dongbing
    McDonald-Maier, Klaus
    Howells, Gareth
    2012 INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS, 2012, : 168 - 174
  • [50] CRYPTOGRAPHIC KEY MANAGEMENT SCHEME FOR IMPLEMENTING DATA ENCRYPTION STANDARD
    EHRSAM, WF
    MATYAS, SM
    MEYER, CH
    TUCHMAN, WL
    IBM SYSTEMS JOURNAL, 1978, 17 (02) : 106 - 125