Dynamic and efficient key management for access hierarchies
Proceedings of the 12th ACM conference on Computer and communications security
Key management for non-tree access hierarchies
Proceedings of the eleventh ACM symposium on Access control models and technologies
Access control in user hierarchy based on elliptic curve cryptosystem
Information Sciences: an International Journal
A dynamic key management solution to access hierarchy
International Journal of Network Management
Dynamic and Efficient Key Management for Access Hierarchies
ACM Transactions on Information and System Security (TISSEC)
Group Key Management: From a Non-hierarchical to a Hierarchical Structure
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
Design of a lattice-based access control scheme
SMC'09 Proceedings of the 2009 IEEE international conference on Systems, Man and Cybernetics
Efficient utilization of elliptic curve cryptosystem for hierarchical access control
Journal of Systems and Software
Secure key management scheme for dynamic hierarchical access control based on ECC
Journal of Systems and Software
Secured cloud storage scheme using ECC based key management in user hierarchy
ICISS'11 Proceedings of the 7th international conference on Information Systems Security
Information Sciences: an International Journal
International Journal of Communication Networks and Distributed Systems
Hi-index | 0.00 |
In this paper, a key assignment scheme whose securityis based on solving discrete logarithms is proposed to workout a solution on the access control problem in an arbitrarypartially ordered user hierarchy. Each user is assigned asecret key used to efficiently derive his successors' secretkey and assigned an encryption key at the same time used toencrypt his information items or files only. Thus, any usercan freely change his own encryption key for some security reasons without caring about those security classes withlower clearances to make their information items been re-enciphered. And moreover, make a security class be addedinto or deleted from the hierarchy without changing any issued keys.