Comments on a cryptographic key assignment scheme

  • Authors:
  • Qiang Tang;Chris J. Mitchell

  • Affiliations:
  • Information Security Group, University of London, Royal Holloway, Egham Surrey TW20 0EX, UK;Information Security Group, University of London, Royal Holloway, Egham Surrey TW20 0EX, UK

  • Venue:
  • Computer Standards & Interfaces
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we analyse the security of a cryptographic key assignment scheme, recently proposed by Huang and Chang, that is designed to provide time-constrained hierarchical access control. We show that the new scheme has potential security vulnerabilities, which enable malicious users and attackers to violate the privacy of other users.