Communications of the ACM
The State of Elliptic Curve Cryptography
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
Cryptographic solution to a problem of access control in a hierarchy
ACM Transactions on Computer Systems (TOCS)
A Fast Software Implementation for Arithmetic Operations in GF(2n)
ASIACRYPT '96 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Fast Key Exchange with Elliptic Curve Systems
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
The Performance Measurement of Cryptographic Primitives on Palm Devices
ACSAC '01 Proceedings of the 17th Annual Computer Security Applications Conference
Controlling access in large partially ordered hierarchies using cryptographic keys
Journal of Systems and Software
A Key Assignment Scheme for Controlling Access in Partially Ordered User Hierarchies
AINA '04 Proceedings of the 18th International Conference on Advanced Information Networking and Applications - Volume 2
Journal of Systems and Software
Access control in user hierarchy based on elliptic curve cryptosystem
Information Sciences: an International Journal
Probabilistic algorithms in finite fields
SFCS '81 Proceedings of the 22nd Annual Symposium on Foundations of Computer Science
An efficient dynamic group key agreement protocol for imbalanced wireless networks
International Journal of Network Management
Efficient utilization of elliptic curve cryptosystem for hierarchical access control
Journal of Systems and Software
CHES'10 Proceedings of the 12th international conference on Cryptographic hardware and embedded systems
Secure key management scheme for dynamic hierarchical access control based on ECC
Journal of Systems and Software
An access control scheme for partially ordered set hierarchy with provable security
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
International Journal of Information Security
Information Sciences: an International Journal
An Efficient Key-Management Scheme for Hierarchical Access Control in E-Medicine System
Journal of Medical Systems
Hi-index | 0.00 |
The hierarchical cryptographic key assignment is used to assign cryptographic keys to a set of partially ordered security classes so that the user in a higher security class can derive the cryptographic secret keys of the other users in a lower security class. In this paper, we propose a practical solution for dynamic access problems in a user hierarchy, which uses the polynomial interpolation and hash function. When compared with other related recent existing access control schemes, in our scheme the computational complexity and the required storage space are significantly reduced. In addition, our scheme provides provable security. Furthermore, our scheme is easy to implement and therefore, it is more suitable for practical applications.