English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 55176/89445 (62%)
造訪人次 : 10658205      線上人數 : 20
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋
    請使用永久網址來引用或連結此文件: http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/59889

    題名: Cryptographic key assignment scheme for access control in a hierarchy
    作者: Chang, Chin Chen;Hwang, Ren-junn;Wu, Tzong-Chen
    貢獻者: 淡江大學資訊工程學系
    關鍵詞: Access control;Cryptographic key assignment;Secure broadcasting
    日期: 1992-05
    上傳時間: 2013-06-07 10:45:19 (UTC+8)
    出版者: Kidlington: Pergamon
    摘要: The hierarchical cryptographic key assignment is used to assign cryptographic keys to a set of partially ordered classes so that the user in a higher class can derive the cryptographic key for users in a lower class. However, the existing secure schemes for the cryptographic key assignment in a hierarchy do not consider the situation that a user may be in a class for only a period of time. If a user resigned from his class ci and he premeditatedly eavesdrops on data transmissions, then he can also decrypt the data in class cj if and only if the class cj is lower than the class ci. Thus, all messages are likely to be compromised during the span of the system. In this paper, we propose a new cryptographic key assignment scheme with time-constraint in which the cryptographic keys of a class are different for each time period. Our goal is to minimize the potential damages over a public network. Once the time period is expired, the cryptographic keys' owner cannot access any subsequent class keys. Therefore, as a user resigned from his class premeditatedly eavesdrops on later messages, he cannot then decrypt the message with his old keys. Moreover, in the proposed method, the key generation and key derivation are quite simple, and the number of the public/secret parameters for each authenticated user is fixed and small which differs from most previously proposed schemes. Hence, it is very appropriate to communicate securely over an open network.
    關聯: Information Systems 17(3), pp.243-247
    DOI: 10.1016/S0920-5489(03)00073-4
    顯示於類別:[資訊工程學系暨研究所] 期刊論文


    檔案 大小格式瀏覽次數



    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - 回饋