An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy
IEEE Transactions on Computers
A cryptographic key generation scheme for multilevel data security
Computers and Security
The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
Cryptographic solution to a problem of access control in a hierarchy
ACM Transactions on Computer Systems (TOCS)
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
Key assignment for enforcing access control policy exceptions in distributed systems
Information Sciences: an International Journal
Controlling access in large partially ordered hierarchies using cryptographic keys
Journal of Systems and Software
A Key Assignment Scheme for Controlling Access in Partially Ordered User Hierarchies
AINA '04 Proceedings of the 18th International Conference on Advanced Information Networking and Applications - Volume 2
Cryptographic key assignment schemes for any access control policy
Information Processing Letters
Efficient Diffie-Hellmann two-party key agreement protocols based on elliptic curves
Proceedings of the 2005 ACM symposium on Applied computing
Journal of Systems and Software
A new key assignment scheme for access control in a complete tree hierarchy
WCC'05 Proceedings of the 2005 international conference on Coding and Cryptography
Enforcing the security of a time-bound hierarchical key assignment scheme
Information Sciences: an International Journal
An access control scheme for partially ordered set hierarchy with provable security
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
Research: Dynamic key management schemes for access control in a hierarchy
Computer Communications
An Agent-Based English Auction Protocol Using Elliptic Curve Cryptosystem for Mobile Commerce
ICA3PP '09 Proceedings of the 9th International Conference on Algorithms and Architectures for Parallel Processing
Hidden attribute-based signatures without anonymity revocation
Information Sciences: an International Journal
An efficient date-constraint hierarchical key management scheme for mobile agents
Expert Systems with Applications: An International Journal
Efficient utilization of elliptic curve cryptosystem for hierarchical access control
Journal of Systems and Software
An efficient key assignment scheme for access control in a large leaf class hierarchy
Information Sciences: an International Journal
Secure key management scheme for dynamic hierarchical access control based on ECC
Journal of Systems and Software
An agent-based English auction protocol using Elliptic Curve Cryptosystem for mobile commerce
Expert Systems with Applications: An International Journal
Elliptic curve cryptography: survey and its security applications
ACAI '11 Proceedings of the International Conference on Advances in Computing and Artificial Intelligence
Secured cloud storage scheme using ECC based key management in user hierarchy
ICISS'11 Proceedings of the 7th international conference on Information Systems Security
Information Sciences: an International Journal
International Journal of Communication Networks and Distributed Systems
A secure effective key management scheme for dynamic access control in a large leaf class hierarchy
Information Sciences: an International Journal
Hi-index | 0.08 |
This work proposes a novel key management method based on elliptic curve cryptosystem and one-way hash function to solve dynamic access problems in a user hierarchy. The proposed scheme attempts to derive the secret key of successors efficiently and non-redundantly. It includes functions such as insertion and removal of classes, updating of their relationships, and changing of secret keys. The method utilizes a Central Authority, which enables a user to change the secret key at will conveniently. Since the proposed method uses the elliptic curve cryptosystem which has a low computational cost and small key size, its performance in terms of both security and efficiency is quite commendable. Therefore, it can be anticipated that its use will be extended to wireless communication in the future.