메뉴 건너뛰기




Volumn 83, Issue 10, 2010, Pages 1917-1929

Efficient utilization of elliptic curve cryptosystem for hierarchical access control

Author keywords

Access control; Elliptic curve cryptosystems; Key management; Security; User hierarchy

Indexed keywords

COMPUTATIONAL COSTS; ELLIPTIC CURVE CRYPTOSYSTEM; ELLIPTIC CURVE CRYPTOSYSTEMS; HIERARCHICAL ACCESS CONTROL; KEY GENERATION; KEY MANAGEMENT; KEY SIZES; SECRET KEY; SECURITY; TIME COMPLEXITY; USER HIERARCHY;

EID: 77956061440     PISSN: 01641212     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jss.2010.05.072     Document Type: Article
Times cited : (34)

References (40)
  • 1
    • 0020931264 scopus 로고
    • Cryptographic solution to a multilevel security problem
    • S.G. Akl, and P.D. Taylor Cryptographic solution to a multilevel security problem D. Chaum, R.L. Rivest, A.T. Sherman, Advances in Cryptology 1982 237 249
    • (1982) Advances in Cryptology , pp. 237-249
    • Akl, S.G.1    Taylor, P.D.2
  • 2
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • S.G. Akl, and P.D. Taylor Cryptographic solution to a problem of access control in a hierarchy ACM Transaction on Computer Systems 1 3 1983 239 248
    • (1983) ACM Transaction on Computer Systems , vol.1 , Issue.3 , pp. 239-248
    • Akl, S.G.1    Taylor, P.D.2
  • 4
    • 38849139678 scopus 로고    scopus 로고
    • Reducing inference control to access control for normalized database schemas
    • J. Biskup, D.W. Embley, and J.H. Lochner Reducing inference control to access control for normalized database schemas Information Processing Letters 106 1 2008 8 12
    • (2008) Information Processing Letters , vol.106 , Issue.1 , pp. 8-12
    • Biskup, J.1    Embley, D.W.2    Lochner, J.H.3
  • 6
    • 32644451622 scopus 로고    scopus 로고
    • A new solution for assigning cryptographic keys to control access in mobile agent environments
    • C.C. Chang, and I.C. Lin A new solution for assigning cryptographic keys to control access in mobile agent environments Wireless Communications and Mobile Computing 6 1 2006 137 146
    • (2006) Wireless Communications and Mobile Computing , vol.6 , Issue.1 , pp. 137-146
    • Chang, C.C.1    Lin, I.C.2
  • 7
    • 0001692137 scopus 로고
    • Cryptographic key assignment scheme for access control in a hierarchy
    • C.C. Chang, R.J. Hwang, and T.C. Wu Cryptographic key assignment scheme for access control in a hierarchy Information Systems 17 3 1992 243 247
    • (1992) Information Systems , vol.17 , Issue.3 , pp. 243-247
    • Chang, C.C.1    Hwang, R.J.2    Wu, T.C.3
  • 10
    • 34948898634 scopus 로고    scopus 로고
    • Access control in user hierarchy based on elliptic curve cryptosystem
    • Y.F. Chung, H.H. Lee, F. Lai, and T.S. Chen Access control in user hierarchy based on elliptic curve cryptosystem Information Sciences 178 2008 230 243
    • (2008) Information Sciences , vol.178 , pp. 230-243
    • Chung, Y.F.1    Lee, H.H.2    Lai, F.3    Chen, T.S.4
  • 11
    • 57349175668 scopus 로고    scopus 로고
    • New stream ciphers based on elliptic curve point multiplication
    • P.P. Deepthi, and P.S. Sathidevi New stream ciphers based on elliptic curve point multiplication Computer Communications 32 2009 25 33
    • (2009) Computer Communications , vol.32 , pp. 25-33
    • Deepthi, P.P.1    Sathidevi, P.S.2
  • 12
    • 43049173407 scopus 로고    scopus 로고
    • Versatile Multiplier Architectures in GF(2k) fields using the Montgomery Multiplication Algorithm
    • May
    • Fournaris, A.P., Koufopavlou, O., 2008. Versatile Multiplier Architectures in GF(2k) fields using the Montgomery Multiplication Algorithm. INTEGRATION, the VLSI Journal, 41 (May (3)), 371-384.
    • (2008) INTEGRATION, the VLSI Journal , vol.41 , Issue.3 , pp. 371-384
    • Fournaris, A.P.1    Koufopavlou, O.2
  • 14
    • 0000954459 scopus 로고
    • A cryptographic key generation scheme for multilevel data security
    • L. Harn, and H.Y. Lin A cryptographic key generation scheme for multilevel data security Computer Security 9 1990 539 546
    • (1990) Computer Security , vol.9 , pp. 539-546
    • Harn, L.1    Lin, H.Y.2
  • 17
    • 0038053203 scopus 로고    scopus 로고
    • Controlling access in large partially-ordered hierarchies using cryptographic keys
    • M.S. Hwang, and W.P. Yang Controlling access in large partially-ordered hierarchies using cryptographic keys Journal of Systems and Software 67 2 2003 99 107
    • (2003) Journal of Systems and Software , vol.67 , Issue.2 , pp. 99-107
    • Hwang, M.S.1    Yang, W.P.2
  • 18
    • 33745856988 scopus 로고    scopus 로고
    • An efficient key-management scheme for hierarchical access control based on elliptic curve cryptosystem
    • F.G. Jeng, and C.M. Wang An efficient key-management scheme for hierarchical access control based on elliptic curve cryptosystem The Journal of Systems and Software 79 2006 1161 1167
    • (2006) The Journal of Systems and Software , vol.79 , pp. 1161-1167
    • Jeng, F.G.1    Wang, C.M.2
  • 21
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • K. Koblitz Elliptic curve cryptosystems Mathematics of Computation 48 177 1987 203 209
    • (1987) Mathematics of Computation , vol.48 , Issue.177 , pp. 203-209
    • Koblitz, K.1
  • 23
    • 2342477274 scopus 로고    scopus 로고
    • Efficient access control and key management schemes for mobile agents
    • I.C. Lin, H.H. Ou, and M.S. Hwang Efficient access control and key management schemes for mobile agents Computer Standards & Interfaces 26 2004 423 433
    • (2004) Computer Standards & Interfaces , vol.26 , pp. 423-433
    • Lin, I.C.1    Ou, H.H.2    Hwang, M.S.3
  • 25
    • 0022115074 scopus 로고
    • An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
    • S.T. Mackinnon, and P.D. Taylor An optimal algorithm for assigning cryptographic keys to control access in a hierarchy IEEE Transaction on Computer Systems 34 9 1985 797 802
    • (1985) IEEE Transaction on Computer Systems , vol.34 , Issue.9 , pp. 797-802
    • MacKinnon, S.T.1    Taylor, P.D.2
  • 27
    • 46149115413 scopus 로고    scopus 로고
    • A protocol for digital signature based on the elliptic curve discrete logarithm problem
    • M. Nikooghadam, M.R. Bonyadi, E. Malekian, and A. Zakerolhosseini A protocol for digital signature based on the elliptic curve discrete logarithm problem Journal of Applied Sciences 8 10 2008 1919 1925
    • (2008) Journal of Applied Sciences , vol.8 , Issue.10 , pp. 1919-1925
    • Nikooghadam, M.1    Bonyadi, M.R.2    Malekian, E.3    Zakerolhosseini, A.4
  • 31
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R.L. Rivest, A. Shamir, and L. Adleman A method for obtaining digital signatures and public-key cryptosystems Communications of the ACM 21 2 1978 120 126
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 32
    • 0032121340 scopus 로고    scopus 로고
    • Access control and key management for mobile agents
    • V. Roth, and M. Jalali access control and key management for mobile agents Computer & Graphics 22 4 1998 457 461
    • (1998) Computer & Graphics , vol.22 , Issue.4 , pp. 457-461
    • Roth, V.1    Jalali, M.2
  • 33
    • 34250306664 scopus 로고    scopus 로고
    • Threshold cryptography in P2P and MANETs: The case of access control
    • N. Saxena, G. Tsudik, and J.H. Yi Threshold cryptography in P2P and MANETs: the case of access control Computer Networks 51 2007 3632 3649
    • (2007) Computer Networks , vol.51 , pp. 3632-3649
    • Saxena, N.1    Tsudik, G.2    Yi, J.H.3
  • 34
    • 0036222059 scopus 로고    scopus 로고
    • A novel key management scheme based on discrete logarithms and polynomial interpolations
    • V.R.L. Shen, and T.S. Chen A novel key management scheme based on discrete logarithms and polynomial interpolations Computers and Security 21 2 2002 164 171
    • (2002) Computers and Security , vol.21 , Issue.2 , pp. 164-171
    • Shen, V.R.L.1    Chen, T.S.2
  • 37
    • 0043135196 scopus 로고    scopus 로고
    • Elliptic curve cryptosystem-the answer to strong, fast public-key cryptography for securing constrained environments
    • S.A. Vanstone Elliptic curve cryptosystem-the answer to strong, fast public-key cryptography for securing constrained environments Information Security Technical Report 12 2 1997 78 87
    • (1997) Information Security Technical Report , vol.12 , Issue.2 , pp. 78-87
    • Vanstone, S.A.1
  • 38
    • 33745584616 scopus 로고    scopus 로고
    • An access control scheme for partially ordered set hierarchy with provable security
    • J. Wu, and R. Wei An access control scheme for partially ordered set hierarchy with provable security Proceedings of SAC 2005, LNCS 3897 2006 221 232
    • (2006) Proceedings of SAC 2005, LNCS 3897 , pp. 221-232
    • Wu, J.1    Wei, R.2
  • 40
    • 38049032950 scopus 로고    scopus 로고
    • A secure time-bound hierarchical key assignment scheme based on RSA public key cryptosystem
    • J.H. Yeh A secure time-bound hierarchical key assignment scheme based on RSA public key cryptosystem Information Processing Letters 105 2008 117 120
    • (2008) Information Processing Letters , vol.105 , pp. 117-120
    • Yeh, J.H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.