Cryptographic implementation of a tree hierarchy for access control
Information Processing Letters
A cryptographic key generation scheme for multilevel data security
Computers and Security
Cryptographic solution to a problem of access control in a hierarchy
ACM Transactions on Computer Systems (TOCS)
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
A new key assignment scheme for enforcing complicated access control policies in hierarchy
Future Generation Computer Systems - Selected papers from CCGRID 2002
Controlling access in large partially ordered hierarchies using cryptographic keys
Journal of Systems and Software
Cryptanalysis of Hwang-Yang scheme for controlling access in large partially ordered hierarchies
Journal of Systems and Software - Special issue: Software engineering education and training
Journal of Systems and Software
Access control in user hierarchy based on elliptic curve cryptosystem
Information Sciences: an International Journal
PRESENT: An Ultra-Lightweight Block Cipher
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
Efficient utilization of elliptic curve cryptosystem for hierarchical access control
Journal of Systems and Software
CHES'10 Proceedings of the 12th international conference on Cryptographic hardware and embedded systems
An efficient key assignment scheme for access control in a large leaf class hierarchy
Information Sciences: an International Journal
Secure key management scheme for dynamic hierarchical access control based on ECC
Journal of Systems and Software
International Journal of Information Security
Information Sciences: an International Journal
An Efficient Key-Management Scheme for Hierarchical Access Control in E-Medicine System
Journal of Medical Systems
Secure Communication of Medical Information Using Mobile Agents
Journal of Medical Systems
Hi-index | 0.07 |
Lo et al. (2011) proposed an efficient key assignment scheme for access control in a large leaf class hierarchy where the alternations in leaf classes are more frequent than in non-leaf classes in the hierarchy. Their scheme is based on the public-key cryptosystem and hash function where operations like modular exponentiations are very much costly compared to symmetric-key encryptions and decryptions, and hash computations. Their scheme performs better than the previously proposed schemes. However, in this paper, we show that Lo et al.'s scheme fails to preserve the forward security property where a security class C"x can also derive the secret keys of its successor classes C"j's even after deleting the security class C"x from the hierarchy. We aim to propose a new key management scheme for dynamic access control in a large leaf class hierarchy, which makes use of symmetric-key cryptosystem and one-way hash function. We show that our scheme requires significantly less storage and computational overheads as compared to Lo et al.'s scheme and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against all possible attacks including the forward security. In addition, our scheme supports efficiently dynamic access control problems compared to Lo et al.'s scheme and other related schemes. Thus, higher security along with low storage and computational costs make our scheme more suitable for practical applications compared to other schemes.