Cryptanalyses and improvements of two cr
โ
Chien-Lung Hsu; Tzong-Sun Wu
๐
Article
๐
2003
๐
Elsevier Science
๐
English
โ 152 KB
## Recently, Wu and Chang and Shen and Chen separately proposed a cryptographic key assignment scheme for solving access control problem in a partially ordered user hierarchy. However, this paper will show the security leaks inherent in both schemes based on polynomial interpolations. That is, the u