scispace - formally typeset
Journal ArticleDOI

An efficient key-management scheme for hierarchical access control based on elliptic curve cryptosystem

Fuh-Gwo Jeng, +1 more
- 01 Aug 2006 - 
- Vol. 79, Iss: 8, pp 1161-1167
Reads0
Chats0
TLDR
An efficient key management and derivation scheme based on the elliptic curve cryptosystem is proposed to solve the hierarchical access control problem and is shown much more efficiently and flexibly than the schemes proposed previously.
About
This article is published in Journal of Systems and Software.The article was published on 2006-08-01. It has received 37 citations till now. The article focuses on the topics: Cryptosystem & Hybrid cryptosystem.

read more

Citations
More filters
Journal ArticleDOI

Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem

TL;DR: The main theme of this paper is very simple: a security flaw is presented on Chung et al.'s scheme and then a fix is provided in order to remedy the security flaw found.
Journal ArticleDOI

Access control in user hierarchy based on elliptic curve cryptosystem

TL;DR: This work proposes a novel key management method based on elliptic curve cryptosystem and one-way hash function to solve dynamic access problems in a user hierarchy and its performance in terms of both security and efficiency is quite commendable.
Journal ArticleDOI

An Efficient Key-Management Scheme for Hierarchical Access Control in E-Medicine System

TL;DR: A practical solution for dynamic access problem in a user hierarchy based on hybrid cryptosystems that provides provable security, and is easy to implement for e-medicine system is proposed.
Journal ArticleDOI

Achieving Simple, Secure and Efficient Hierarchical Access Control in Cloud Computing

TL;DR: A hierarchical key assignment scheme based on linear-geometry as the solution of flexible and fine-grained hierarchical access control in cloud computing and provides strong key indistinguishability under the assumption of pseudorandom functions.
Journal ArticleDOI

A secure effective key management scheme for dynamic access control in a large leaf class hierarchy

TL;DR: This paper aims to propose a new key management scheme for dynamic access control in a large leaf class hierarchy, which makes use of symmetric-key cryptosystem and one-way hash function, and shows that this scheme requires significantly less storage and computational overheads and is secure against all possible attacks including the forward security.
References
More filters
Book

The Art of Computer Programming

TL;DR: The arrangement of this invention provides a strong vibration free hold-down mechanism while avoiding a large pressure drop to the flow of coolant fluid.
Journal ArticleDOI

Elliptic curve cryptosystems

TL;DR: The question of primitive points on an elliptic curve modulo p is discussed, and a theorem on nonsmoothness of the order of the cyclic subgroup generated by a global point is given.
Book ChapterDOI

Use of Elliptic Curves in Cryptography

TL;DR: In this paper, an analogue of the Diffie-Hellmann key exchange protocol was proposed, which appears to be immune from attacks of the style of Western, Miller, and Adleman.
Book

Cryptography and Network Security: Principles and Practice

TL;DR: The new edition of William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students.
Related Papers (5)