An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy
IEEE Transactions on Computers
Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
A cryptographic key generation scheme for multilevel data security
Computers and Security
Cryptographic key assignment scheme for access control in a hierarchy
Information Systems
The State of Elliptic Curve Cryptography
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
Cryptographic solution to a problem of access control in a hierarchy
ACM Transactions on Computer Systems (TOCS)
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Controlling access in large partially ordered hierarchies using cryptographic keys
Journal of Systems and Software
Guide to Elliptic Curve Cryptography
Guide to Elliptic Curve Cryptography
A Key Assignment Scheme for Controlling Access in Partially Ordered User Hierarchies
AINA '04 Proceedings of the 18th International Conference on Advanced Information Networking and Applications - Volume 2
Wireless Communications & Mobile Computing
Journal of Systems and Software
Key management for role hierarchy in distributed systems
Journal of Network and Computer Applications
A network access control approach based on the AAA architecture and authorization attributes
Journal of Network and Computer Applications
Threshold cryptography in P2P and MANETs: The case of access control
Computer Networks: The International Journal of Computer and Telecommunications Networking
Access control in user hierarchy based on elliptic curve cryptosystem
Information Sciences: an International Journal
A secure time-bound hierarchical key assignment scheme based on RSA public key cryptosystem
Information Processing Letters
Reducing inference control to access control for normalized database schemas
Information Processing Letters
Versatile multiplier architectures in GF(2k) fields using the Montgomery multiplication algorithm
Integration, the VLSI Journal
Efficient migration for mobile computing in distributed networks
Computer Standards & Interfaces
New stream ciphers based on elliptic curve point multiplication
Computer Communications
An access control scheme for partially ordered set hierarchy with provable security
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
Elliptic curve cryptography: survey and its security applications
ACAI '11 Proceedings of the International Conference on Advances in Computing and Artificial Intelligence
Secured cloud storage scheme using ECC based key management in user hierarchy
ICISS'11 Proceedings of the 7th international conference on Information Systems Security
Secure Communication of Medical Information Using Mobile Agents
Journal of Medical Systems
Secure Transmission of Mobile Agent in Dynamic Distributed Environments
Wireless Personal Communications: An International Journal
Utilization of Pipeline Technique in AOP Based Multipliers with Parallel Inputs
Journal of Signal Processing Systems
International Journal of Communication Networks and Distributed Systems
A secure effective key management scheme for dynamic access control in a large leaf class hierarchy
Information Sciences: an International Journal
Hi-index | 0.01 |
The elliptic curve cryptosystem (ECC) has recently received significant attention by researchers due to its high performance, low computational cost, and small key size. In this paper, an efficient key management and derivation scheme based on ECC is proposed to solve dynamic access problems in a user hierarchy. Compared to previous ECC based works, the proposed method does not require constructing interpolate polynomials, therefore, the computational complexity of key generation and key derivation is significantly reduced. At the same time, time complexity of adding/deleting security classes, modifying their relationships, and changing of secret keys is decreased in the proposed method.