## Recently, Wu and Chang and Shen and Chen separately proposed a cryptographic key assignment scheme for solving access control problem in a partially ordered user hierarchy. However, this paper will show the security leaks inherent in both schemes based on polynomial interpolations. That is, the u
โฆ LIBER โฆ
Cryptographic key assignment scheme for dynamic access control in a user hierarchy
โ Scribed by Kuo, F.H.; Shen, V.R.L.; Chen, T.S.; Lai, F.
- Book ID
- 114448379
- Publisher
- The Institution of Electrical Engineers
- Year
- 1999
- Tongue
- English
- Weight
- 629 KB
- Volume
- 146
- Category
- Article
- ISSN
- 1350-2387
No coin nor oath required. For personal study only.
๐ SIMILAR VOLUMES
Cryptanalyses and improvements of two cr
โ
Chien-Lung Hsu; Tzong-Sun Wu
๐
Article
๐
2003
๐
Elsevier Science
๐
English
โ 152 KB
Cryptographic key assignment scheme for
โ
Chin-Chen Chang; Ren-Junn Hwang; Tzong-Chen Wu
๐
Article
๐
1992
๐
Elsevier Science
๐
English
โ 479 KB
A cryptographic key assignment scheme in
โ
Hwang Min-Shiang
๐
Article
๐
1997
๐
Elsevier Science
๐
English
โ 416 KB
Access control is one of the mechanisms for data protection in a computer system. Many literaturee besed on cryptography have been proposed to solve the problem of access control in hierarchic structurea. Recently, Liaw and Lei proposed an optimal heuristic algorithm for multilevel data security. Bu
A time-bound cryptographic key assignmen
โ
Wen-Guey Tzeng
๐
Article
๐
2002
๐
IEEE
๐
English
โ 182 KB
A cryptographic implementation for dynam
โ
Tsai Hui-Min; Chang Chin-Chen
๐
Article
๐
1995
๐
Elsevier Science
๐
English
โ 729 KB
A new cryptographic key assignment schem
โ
Hui-Feng Huang; Chin-Chen Chang
๐
Article
๐
2004
๐
Elsevier Science
๐
English
โ 149 KB