메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 223-230

A secure system for data access based on anonymous authentication and time-dependent hierarchical keys

Author keywords

Anonymous authentication; Entity security; Hierarchical keys; Trapdoor time sharable sequence; World wide web security

Indexed keywords

CRYPTOGRAPHY; DATABASE SYSTEMS; HIERARCHICAL SYSTEMS; USER INTERFACES; WEBSITES;

EID: 34247380378     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1128817.1128851     Document Type: Conference Paper
Times cited : (29)

References (23)
  • 1
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • S.G. Aid and P.D. Taylor. Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer System, 1(3), pp.239-248, 1983.
    • (1983) ACM Transactions on Computer System , vol.1 , Issue.3 , pp. 239-248
    • Aid, S.G.1    Taylor, P.D.2
  • 2
    • 0033279983 scopus 로고    scopus 로고
    • D. Boneh, M. Franklin. Anonymous authentication with subset queries. In Proceedings of The 6th ACM Conference on Computer and Communications Security, ACM Press, 1999.
    • D. Boneh, M. Franklin. Anonymous authentication with subset queries. In Proceedings of The 6th ACM Conference on Computer and Communications Security, ACM Press, 1999.
  • 3
    • 0001692137 scopus 로고
    • Cryptographic key assignment scheme for access control in a hierarchy
    • C.C. Chang, R.J. Hwaug, and T.C. Wu. Cryptographic key assignment scheme for access control in a hierarchy. Information Systems 17(3), pp.243-247, 1992.
    • (1992) Information Systems , vol.17 , Issue.3 , pp. 243-247
    • Chang, C.C.1    Hwaug, R.J.2    Wu, T.C.3
  • 4
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to rnako big brother obsolete
    • D. Chaum. Security without identification: transaction systems to rnako big brother obsolete. Communications of the ACM 28(10), pp.1030-1044, 1985.
    • (1985) Communications of the ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 5
    • 79251590715 scopus 로고    scopus 로고
    • D. Chaum, J.-H. Evertse. A secure and privacy-protecting protocol for transmitting personal information between orgainzation. In Proceedings of Advances in Cryptology - Crypto 86, Lecture Notes in Computer Science 263, pp.118-167, 1986.
    • D. Chaum, J.-H. Evertse. A secure and privacy-protecting protocol for transmitting personal information between orgainzation. In Proceedings of Advances in Cryptology - Crypto 86, Lecture Notes in Computer Science 263, pp.118-167, 1986.
  • 6
    • 0030107190 scopus 로고    scopus 로고
    • D.E. Denning, D.K. Branstad. A taxonomy for key escrow encryption systems. Communications of the ACM 39 (3), pp.34:-40, 1.996.
    • D.E. Denning, D.K. Branstad. A taxonomy for key escrow encryption systems. Communications of the ACM 39 (3), pp.34:-40, 1.996.
  • 7
    • 0024984004 scopus 로고    scopus 로고
    • U. Feige, A. Shamir. Witness indistinguishable and witness hiding protocols. In Proceedings of The 22nd A CM Symposium on Theory of Computing, pp.416-4.26, ACM Press, 1990.
    • U. Feige, A. Shamir. Witness indistinguishable and witness hiding protocols. In Proceedings of The 22nd A CM Symposium on Theory of Computing, pp.416-4.26, ACM Press, 1990.
  • 9
    • 0000954459 scopus 로고
    • A cryptographic key generation scheme for multilevel data security
    • L. Harn and H. Y. Lin. A cryptographic key generation scheme for multilevel data security. Computers & Security 9(6), pp.539-546, 1990.
    • (1990) Computers & Security , vol.9 , Issue.6 , pp. 539-546
    • Harn, L.1    Lin, H.Y.2
  • 10
    • 34247373327 scopus 로고    scopus 로고
    • ISO/IEC 9798-1. Information technology - Security techniques - Entity authentication mechanisms - Part 1: General model. ISO, Geneva, Switzerland, 1991 (first edition).
    • ISO/IEC 9798-1. Information technology - Security techniques - Entity authentication mechanisms - Part 1: General model. ISO, Geneva, Switzerland, 1991 (first edition).
  • 11
    • 34247357652 scopus 로고    scopus 로고
    • ISO/IEC 9798-2. Information technology - Security techniques - Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms. ISO, Geneva, Switzerland, 1994 (first edition).
    • ISO/IEC 9798-2. Information technology - Security techniques - Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms. ISO, Geneva, Switzerland, 1994 (first edition).
  • 12
    • 34247395669 scopus 로고    scopus 로고
    • ISO/IEC 9798-3. Information technology - Security techniques - Entity authentication mechanisms - Part 3: Entity authentication using a publio-koy algorithm. ISO, Geneva, Switzerland, 1993 (first edition).
    • ISO/IEC 9798-3. Information technology - Security techniques - Entity authentication mechanisms - Part 3: Entity authentication using a publio-koy algorithm. ISO, Geneva, Switzerland, 1993 (first edition).
  • 13
    • 34247325854 scopus 로고    scopus 로고
    • ISO/IEC 9798-4. Information technology - Security techniques - Entity authentication - Part 4: Mechanisms using a cryptographic check function. ISO, Gonova, Switzerland, 1995 (first edition).
    • ISO/IEC 9798-4. Information technology - Security techniques - Entity authentication - Part 4: Mechanisms using a cryptographic check function. ISO, Gonova, Switzerland, 1995 (first edition).
  • 14
    • 34247378495 scopus 로고    scopus 로고
    • ISO/IEC 9798-5. Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero knowledge techniques. ISO, Geneva, Switzerland, 1996 (draft).
    • ISO/IEC 9798-5. Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero knowledge techniques. ISO, Geneva, Switzerland, 1996 (draft).
  • 15
    • 84957649548 scopus 로고    scopus 로고
    • J. Kilian, E. Petrank. Identity escrow. In Proceedings of Advances in Cryptology - Crypto 98, Lecture Notes in Computer Science 1.462, pp.169-185, Springer-Verlag, 1998.
    • J. Kilian, E. Petrank. Identity escrow. In Proceedings of Advances in Cryptology - Crypto 98, Lecture Notes in Computer Science 1.462, pp.169-185, Springer-Verlag, 1998.
  • 16
    • 0022115074 scopus 로고
    • An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
    • S.J. Mackinnon, P.D. Taylor, H. Meijer, and S.G. Akl. An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Transactions on Computers 34(9), pp.797-802, 1985.
    • (1985) IEEE Transactions on Computers , vol.34 , Issue.9 , pp. 797-802
    • Mackinnon, S.J.1    Taylor, P.D.2    Meijer, H.3    Akl, S.G.4
  • 17
    • 34247332903 scopus 로고    scopus 로고
    • A. Lysyanskaya, R. Rivost, A. Sahai, S. Wolf. Pseudonym systems. The 6th Annual Workshop on Selected Areas in Cryptography, Lecture Notes in Computer Science 1758, Springer-Verlag, 1999.
    • A. Lysyanskaya, R. Rivost, A. Sahai, S. Wolf. Pseudonym systems. The 6th Annual Workshop on Selected Areas in Cryptography, Lecture Notes in Computer Science 1758, Springer-Verlag, 1999.
  • 19
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystoins
    • R. Rivest, A. Shamir, L. Adleman. A method for obtaining digital signatures and public-key cryptosystoins. Communications of the ACM 21(2), pp.120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 21
    • 0344718652 scopus 로고    scopus 로고
    • Common modulus and chosen message attacks on public-key schemes with linear recurrence relations
    • W.-G. Tzeug. Common modulus and chosen message attacks on public-key schemes with linear recurrence relations. Information Processing Letters 70, pp.153-156, 1999.
    • (1999) Information Processing Letters , vol.70 , pp. 153-156
    • Tzeug, W.-G.1
  • 22
    • 0036187601 scopus 로고    scopus 로고
    • A time-bound cryptographic key assignment scheme for access control in a hierarchy
    • W.-G. Tzeng. A time-bound cryptographic key assignment scheme for access control in a hierarchy. IEEE Transactions on Knowledge and Data Engineering 14(1), pp.182-188, 2002.
    • (2002) IEEE Transactions on Knowledge and Data Engineering , vol.14 , Issue.1 , pp. 182-188
    • Tzeng, W.-G.1
  • 23
    • 0033605501 scopus 로고    scopus 로고
    • Inter-protocol interleaving attacks on some authentication and key distribution protocols
    • W.-G. Tzeug, C.-M. Hu. Inter-protocol interleaving attacks on some authentication and key distribution protocols. Information Processing Letters 69(6), pp.297-302, 1999.
    • (1999) Information Processing Letters , vol.69 , Issue.6 , pp. 297-302
    • Tzeug, W.-G.1    Hu, C.-M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.