Skip to main content
Log in

An efficient key assignment scheme based on one-way hash function in a user hierarchy

  • Correspondence
  • Published:
Journal of Computer Science and Technology Aims and scope Submit manuscript

Abstract

In order to solve the problems resulted from dynamic access control in a user hierarchy, a cryptographic key assignment scheme is proposed by Prof. Lin to promote the performing ability and to simplify the procedure. However, it may cause the security in danger as the user changes his secret key; besides, some secret keys may be disclosed due to the unsuitable selection of the security classes' identities. Through setting up a one-way hash function onto Lin's scheme, the proposed modification can greatly improve the security of Lin's scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Lin C H. Dynamic key management schemes for access control in a hierarchy.Computer Communications, 1997, 20(15): 1381–1385.

    Article  Google Scholar 

  2. Nechvatal J. Public Key Cryptography. Contemporary Cryptology: The Science of Information Integrity. Piscataway, IEEE Press, 1992.

    Google Scholar 

  3. William Stallings. Cryptography and Network Security. Second Edition, Prentice Hall International, Inc., 1999.

  4. Lee N Y, Hwang Tzonelih. Comments on dynamic key management schemes for access control in a hierarchy.Computer Communications, Jan., 1999, 22(1): 87–89.

    Article  Google Scholar 

  5. Denning D. Cryptography and Data Security. Addison-Wesley, Reading, MA, 1982.

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chen Tzer-Shyong.

Additional information

Tzer-Shyong Chen received the B.S. degree in computer and information science from the Tung-Hai University in 1989, the M.S. degree in computer and information science from the Chiao-Tung University in 1991, and the Ph.D. degree from the Electrical Engineering Department, Taiwan University in 1996. Currently, he is an associate professor in the Department of Information Management at Tung-Hai University. His current research interests focus on information security, cryptography, and network security.

Yu-Fang Chung received the B.A. degree in English language and literature from the Providence University, in 1994. She is a graduate student in computer science and information engineering at Da-Yeh University. Her current interests focus on information security and cryptography, including the research of access control, digital signature, and proxy signature.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Tzer-Shyong, C., Yu-Fang, C. An efficient key assignment scheme based on one-way hash function in a user hierarchy. J. Comput. Sci. & Technol. 18, 210–213 (2003). https://doi.org/10.1007/BF02948886

Download citation

  • Received:

  • Revised:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF02948886

Keywords

Navigation