Cryptography and network security (2nd ed.): principles and practice
Cryptography and network security (2nd ed.): principles and practice
Cryptography and data security
Cryptography and data security
Research: Dynamic key management schemes for access control in a hierarchy
Computer Communications
Research note: Comments on `dynamic key management schemes for access control in a hierarchy'
Computer Communications
Efficient key assignment for hierarchical access control using one-way hash function
ICCOMP'06 Proceedings of the 10th WSEAS international conference on Computers
Hi-index | 0.00 |
In order to solve the problems resulted from dynamic access control in a user hierarchy, a cryptographic key assignment scheme is proposed by Prof. Lin to promote the performing ability and to simplify the procedure. However, it may cause the security in danger as the user changes his secret key; besides, some secret keys may be disclosed due to the unsuitable selection of the security classes' identities. Through setting up a one-way hash function onto Lin's scheme, the proposed modification can greatly improve the security of Lin's scheme.