메뉴 건너뛰기




Volumn 21, Issue 2, 2002, Pages 164-171

A novel key management scheme based on discrete logarithms and polynomial interpolations

Author keywords

Cryptographic key assignment; Discrete logarithm; Polynomial interpolation; User hierarchy

Indexed keywords

COMPUTER NETWORKS; COMPUTER OPERATING SYSTEMS; CONGESTION CONTROL (COMMUNICATION); DATA ACQUISITION; DATA COMMUNICATION SYSTEMS; DATABASE SYSTEMS; INTERPOLATION; POLYNOMIALS; SECURITY OF DATA;

EID: 0036222059     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0167-4048(02)00211-0     Document Type: Note
Times cited : (79)

References (23)
  • 1
    • 85120101710 scopus 로고    scopus 로고
    • Denning, D.E., Akl, S.G. Morgenstern, M., and Neumann, P.G.: ‘Views for multilevel database security’, P roc. 1986 IEEE Symp. on Security and Privacy , Oakland, CA, 7–9 April 1986, pp. 156–172.
  • 2
    • 85120115761 scopus 로고    scopus 로고
    • Diffie, W. and Hellman, M.E.: ‘New directions in cryptography’, IEEE Transactions on Information Theory , 22, (6), 1976, pp. 644–654.
  • 3
    • 85120104840 scopus 로고    scopus 로고
    • Fraim, L.J.: ‘Scomp: a solution to multilevel security problem’, IEEE Transactions on Computers , C-16, (7), July 1983, pp. 126–143.
  • 4
    • 85120127754 scopus 로고    scopus 로고
    • Pohlig, S. and Hellman, M.E.: ‘An improved algorithm for computing logarithms over GF(P) and its cryptographic significance’, IEEE Transactions on Information Theory , IT-24, 1978, pp. 106–110.
  • 5
    • 85120142203 scopus 로고    scopus 로고
    • Sandhu, R. S.: ‘Cryptographic implementation of a tree hierarchy for access control’, Information Processing Letter , 27, 1988, pp. 95–98.
  • 6
    • 85120113795 scopus 로고    scopus 로고
    • Hwang, M.S., Yang, W.P., and Chang, C.C.: ‘Modified Chang-Hwang-Wu access control scheme’, Electronics Letters , 29, (24), 1993, pp.2095–2096.
  • 7
    • 85120115517 scopus 로고    scopus 로고
    • Akl, S.G.and Taylor, P.D.: ‘Cryptographic solution to a problem of access control in a hierarchy’, ACM Transactions on Computer System , 1, (3), 1983, pp. 239–247.
  • 8
    • 85120126434 scopus 로고    scopus 로고
    • MacKinnon, S.T., Taylor, P.D., Meijer, H., and Akl, S.G.: ‘An optimal algorithm for assigning cryptographic keys to control access in a hierarchy’, IEEE Transactions on Computers, C-34, (9), September 1985, pp. 797–802.
  • 9
    • 85120132239 scopus 로고    scopus 로고
    • Harn, L. and Lin, H.Y.: ‘A cryptographic key generation scheme for multilevel data security’, Computers & Security, 9, 1990, pp. 539–546.
  • 10
    • 85120112941 scopus 로고    scopus 로고
    • Shen, V.R.L., Chen, T.-S., and Lai, F.: ‘Modified cryptographic key assignment scheme for a group-oriented user hierarchy’, IEICE Trans. Fundamentals , E80-A, (10), October 1987, pp. 2032–2034.
  • 11
    • 85120122683 scopus 로고    scopus 로고
    • Shen, V.R.L., Chen, T.-S., and Lai, F.: ‘Novel cryptographic key assignment scheme for dynamic access control in a hierarchy’, IEICE Trans. Fundamentals, E80-A, (10), October 1987, pp. 2035–2037.
  • 12
    • 85120106570 scopus 로고    scopus 로고
    • Chang, C.C., Hwang, R.J., and Wu, T.C.: ‘Cryptographic key assignment scheme for access control in a hierarchy’, Information Systems, 17, (3), 1992, pp. 243–247.
  • 13
    • 85120140128 scopus 로고    scopus 로고
    • Chang, C.C. and Buehrer, D.J.: ‘Access control in a hierarchy using a one-way trapdoor function’, Computers and Mathematics with Applications, 26, (5), 1993, pp. 71–76.
  • 14
    • 85120106296 scopus 로고    scopus 로고
    • Chick, G.C. and Tavares, S.E.: ‘Flexible access control with master keys’, Advances in Cryptology — CRYPTO’89 , Springer-Verlag, 1990, pp. 316–322
  • 15
    • 85120145885 scopus 로고    scopus 로고
    • Tsai, H.M. and Chang, C.C.: ‘A cryptographic implementation for dynamic access control in a user hierarchy’, Computers & Security , 14, (2), 1995, pp. 857–959.
  • 16
    • 85120142308 scopus 로고    scopus 로고
    • Laih, C.S. and Hwang, T.L.: ‘A branch oriented key management solution to dynamic access control in a hierarchy’, IEEE Symposium on Applied Computing, 1991, pp.422–429.
  • 17
    • 85120120542 scopus 로고    scopus 로고
    • Wu, T.C. and Chang, C.C.: ‘Controlling access in tree hierarchies’, Information Sciences, 78, 1994, pp. 69–76.
  • 18
    • 85120122102 scopus 로고    scopus 로고
    • Wu, T.C., Wu, T.S., and He, W.H.: ‘Dynamic access control scheme based on the Chinese remainder theorem’, Computer System Science and Engineering , 10, (2), 1995, pp. 92–99.
  • 19
    • 85120120716 scopus 로고    scopus 로고
    • McCullough, D.: ‘Specifications for multilevel security and a hook-up property’, Proc. 1987 IEEE Symp. on Security and Privacy , April 27–29, 1987, Oakland, CA, pp. 161–166.
  • 20
    • 85120126417 scopus 로고    scopus 로고
    • Shen, V.R.L., Chen, T.-S., and Lai, F.: ‘A cryptographic key assignment scheme for dynamic access control in a user hierarchy’, I EE Procs. Computers and Digital Techniques, 1 46, (5), September 1999, pp. 235–240.
  • 21
    • 85120099217 scopus 로고    scopus 로고
    • Lin C.H.: ‘Dynamic key management schemes for access control in a hierarchy’, Computer Communications, 20, 1997, pp. 1381–1385.
  • 22
    • 85120092326 scopus 로고    scopus 로고
    • Lee, N.Y. and Hwang, T.: ‘Comments on dynamic key management schemes for access in a hierarchy’, Computer Communications , 22, 1999, pp. 87–89.
  • 23
    • 85120094575 scopus 로고    scopus 로고
    • Knuth, D.E. The Art of Computer Programming, Vol. 2, Seminumerical Algorithms , Second Edition, Addison-Wesley, Reading, MA, 1981.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.