Journal ArticleDOI
An efficient key-management scheme for hierarchical access control based on elliptic curve cryptosystem
Fuh-Gwo Jeng,Chung-Ming Wang +1 more
Reads0
Chats0
TLDR
An efficient key management and derivation scheme based on the elliptic curve cryptosystem is proposed to solve the hierarchical access control problem and is shown much more efficiently and flexibly than the schemes proposed previously.About:
This article is published in Journal of Systems and Software.The article was published on 2006-08-01. It has received 37 citations till now. The article focuses on the topics: Cryptosystem & Hybrid cryptosystem.read more
Citations
More filters
Journal ArticleDOI
Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem
TL;DR: The main theme of this paper is very simple: a security flaw is presented on Chung et al.'s scheme and then a fix is provided in order to remedy the security flaw found.
Journal ArticleDOI
Access control in user hierarchy based on elliptic curve cryptosystem
TL;DR: This work proposes a novel key management method based on elliptic curve cryptosystem and one-way hash function to solve dynamic access problems in a user hierarchy and its performance in terms of both security and efficiency is quite commendable.
Journal ArticleDOI
An Efficient Key-Management Scheme for Hierarchical Access Control in E-Medicine System
Shuhua Wu,Kefei Chen +1 more
TL;DR: A practical solution for dynamic access problem in a user hierarchy based on hybrid cryptosystems that provides provable security, and is easy to implement for e-medicine system is proposed.
Journal ArticleDOI
Achieving Simple, Secure and Efficient Hierarchical Access Control in Cloud Computing
TL;DR: A hierarchical key assignment scheme based on linear-geometry as the solution of flexible and fine-grained hierarchical access control in cloud computing and provides strong key indistinguishability under the assumption of pseudorandom functions.
Journal ArticleDOI
A secure effective key management scheme for dynamic access control in a large leaf class hierarchy
TL;DR: This paper aims to propose a new key management scheme for dynamic access control in a large leaf class hierarchy, which makes use of symmetric-key cryptosystem and one-way hash function, and shows that this scheme requires significantly less storage and computational overheads and is secure against all possible attacks including the forward security.
References
More filters
Book
The Art of Computer Programming
TL;DR: The arrangement of this invention provides a strong vibration free hold-down mechanism while avoiding a large pressure drop to the flow of coolant fluid.
Journal ArticleDOI
Elliptic curve cryptosystems
TL;DR: The question of primitive points on an elliptic curve modulo p is discussed, and a theorem on nonsmoothness of the order of the cyclic subgroup generated by a global point is given.
Book ChapterDOI
Use of Elliptic Curves in Cryptography
TL;DR: In this paper, an analogue of the Diffie-Hellmann key exchange protocol was proposed, which appears to be immune from attacks of the style of Western, Miller, and Adleman.
Book
Cryptography and Network Security: Principles and Practice
TL;DR: The new edition of William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students.
Related Papers (5)
Cryptographic solution to a problem of access control in a hierarchy
Selim G. Akl,Peter D. Taylor +1 more
A Novel Key Management Scheme Based on Discrete Logarithms and Polynomial Interpolations
An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy
Mackinnon,Taylor,Meijer,Akl +3 more