Abstract
In order to solve the problems resulted from dynamic access control in a user hierarchy, a cryptographic key assignment scheme is proposed by Prof. Lin to promote the performing ability and to simplify the procedure. However, it may cause the security in danger as the user changes his secret key; besides, some secret keys may be disclosed due to the unsuitable selection of the security classes' identities. Through setting up a one-way hash function onto Lin's scheme, the proposed modification can greatly improve the security of Lin's scheme.
Similar content being viewed by others
References
Lin C H. Dynamic key management schemes for access control in a hierarchy.Computer Communications, 1997, 20(15): 1381–1385.
Nechvatal J. Public Key Cryptography. Contemporary Cryptology: The Science of Information Integrity. Piscataway, IEEE Press, 1992.
William Stallings. Cryptography and Network Security. Second Edition, Prentice Hall International, Inc., 1999.
Lee N Y, Hwang Tzonelih. Comments on dynamic key management schemes for access control in a hierarchy.Computer Communications, Jan., 1999, 22(1): 87–89.
Denning D. Cryptography and Data Security. Addison-Wesley, Reading, MA, 1982.
Author information
Authors and Affiliations
Corresponding author
Additional information
Tzer-Shyong Chen received the B.S. degree in computer and information science from the Tung-Hai University in 1989, the M.S. degree in computer and information science from the Chiao-Tung University in 1991, and the Ph.D. degree from the Electrical Engineering Department, Taiwan University in 1996. Currently, he is an associate professor in the Department of Information Management at Tung-Hai University. His current research interests focus on information security, cryptography, and network security.
Yu-Fang Chung received the B.A. degree in English language and literature from the Providence University, in 1994. She is a graduate student in computer science and information engineering at Da-Yeh University. Her current interests focus on information security and cryptography, including the research of access control, digital signature, and proxy signature.
Rights and permissions
About this article
Cite this article
Tzer-Shyong, C., Yu-Fang, C. An efficient key assignment scheme based on one-way hash function in a user hierarchy. J. Comput. Sci. & Technol. 18, 210–213 (2003). https://doi.org/10.1007/BF02948886
Received:
Revised:
Issue Date:
DOI: https://doi.org/10.1007/BF02948886