Efficient Date-Constraint Hierarchical Key Assignment Scheme

نویسندگان

  • Wei-Bin Lee
  • Jia-Hong Li
  • Chyi-Ren Dow
چکیده

It is well-known that there exists a trade-off between crypto-period and affected risk, so the key derivation is not only constrained by the partial-order class relation but also by the time period while handling hierarchical key assignment in dynamic enterprises. In this paper, a new date-constraint hierarchical key assignment scheme, which does not make use of public key cryptosystem, is proposed to give a cost-effective solution.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Novel E-Newspapers Publication System Using Provably Secure Time-Bound Hierarchical Key Assignment Scheme and XML Security

A time-bound hierarchical key assignment scheme is a cryptographic key assignment scheme that organizes and encrypts the resources, according to the hierarchical tree relations and the time constraint, such that only authorized users can efficiently access the resources. This paper proposes a practical time-bound key assignment scheme, which is efficient and is proved secure. We, based on the t...

متن کامل

Efficient and Scalable Hierarchical Key Assignment Scheme

The access privileges in distributed systems are often organized as a hierarchy structure. Chien and Jan proposed an efficient hierarchical key assignment scheme without using the public key cryptosystem in 2003. Nevertheless, their scheme must use the smart card and the information published on the public board contains the essential secrets of the server and the corresponding users. We theref...

متن کامل

Efficient Key Assignment for Hierarchical Access Control using One-way Hash Function

An efficient hierarchical key assignment scheme for access control based on one-way hash function is proposed, which allows the user in a security class to derive the keys of its subordinating classes, so that the superior class can access the information encrypted and owned by its subordinating classes. This scheme is also flexible to change the hierarchical relationship among security classes...

متن کامل

Efficient Provably-Secure Hierarchical Key Assignment Schemes

A hierarchical key assignment scheme is a method to assign some private information and encryption keys to a set of classes in a partially ordered hierarchy, in such a way that the private information of a higher class can be used to derive the keys of all classes lower down in the hierarchy. In this paper we design and analyze hierarchical key assignment schemes which are provablysecure and su...

متن کامل

SINGLE MACHINE DUE DATE ASSIGNMENT SCHEDULING PROBLEM WITH PRECEDENCE CONSTRAINTS AND CONTROLLABLE PROCESSING TIMES IN FUZZY ENVIRONMENT

In this paper, a due date assignment scheduling problem with precedence constraints and controllable processing times in uncertain environment is investigated, in which the basic processing time of each job is assumed to be the symmetric trapezoidal fuzzy number, and the linear resource consumption function is used.The objective is to minimize the crisp possibilistic mean (or expected) value of...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005