Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Computer Engineering》 2006-12
Add to Favorite Get Latest Update

Secure Efficient Hierarchical Key Management in Distributed Environments

LU Jianzhu,CHEN Huoyan(Department of Computer Science,Jinan University,Guangzhou 510632)  
The paper presents a secure efficient hierarchical key management scheme in order to solve the dynamic access control problems in distributed environments.By using the scheme based on the one-way function,each security class chooses randomly and independently a secret key that can be used to derive his successors’ secret keys efficiently.The dynamic key management problem,such as adding/ deleting classes,and changing secret key,are discussed.Moreover,an improved Lin’s scheme can be derived from the scheme,which overcomes the two vulnerabilities issued by Lee and Hwang,in addition,it is more efficient than other improvement of Lin’s,such as Rhee’s scheme,Chen-Chung scheme,in terms of computational complexities.
【Fund】: 国家自然科学基金资助项目(60173038 69873020);; 广东省自然科学基金资助项目(010421 000759 980690)
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 1 Hits
1 JI Wei,XIN Xiao-long (Department of Mathematic,Northwest University,Xi′an 710127,China);Identity-based hierarchical key management[J];Basic Sciences Journal of Textile Universities;2008-03
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 XU Ji-bin~1,YE Zhen~1,CAI Min~2(1.School of Computer and Information,Hefei University of Technology,Hefei 230039,China;2.Department of Computer Science and Technology,Chaohu College,Chaohu 238000,China);A Key Management Scheme Based on HASH Function[J];Journal of Anhui Normal University(Natural Science);2006-04
2 WANG Peng,CHEN Ji-yu,LI Dong(EE Department,Communication University of China,Beijing 100024,China);The Characteristics and Modeling of Mobile Radio Channels[J];Journal of Communication University of China(Science and Technology);2006-02
3 ZHOU Jie~1,ZHANG Jin-huan~2,WANG Quandi~1(1.School of Mathematical Sciences,South China University of Technology,Guangzhou 510640,China;2.Guangdong Key Laboratory of Computer Network,South China University of Technology,Guangzhou 510640,China);Multicast encryption method based on RSA and key management model[J];Journal of Dalian University of Technology;2005-S1
4 Zhang Yong Zhang Yi Wang Weinong(Network and Information Center,Shanghai Jiaotong University,Shanghai 200030,China);A new group key management scheme based on keys tree, XOR operation and one-way function[J];东南大学学报(英文版);2006-01
5 ;Analysis and Comparison of Two Simulation Environment of Embedded Software[J];Electronic Engineering & Product World;2003-13
6 Wang Jinglin et al;The Debugging of Embedded Application Based on ARM7 Core[J];Electronic Engineer;2000-12
7 ZHANG Guangying,\ DUAN Fangyi,\ XU Lina,\ DENG Zhenglong (Dep. of Control Science and Engineering, Harbin Institute of Technology, Harbin, 150001 P.R.China);The Design of Vehicle GPS Positioning System Based on PC/104[J];Journal of Electron Devices;2002-01
8 QU Jin 1,GE Jian hua 1,JIANG Ming 2 (1 Key Lab of Computer Network and Information Security,Xidian University,Ministry of Education,Xi'an,Shaanxi 710071,China; 2 School of Electronics & Information Technology,Shanghai Jiaotong University,Shanghai 200030,China);On Key Distribution Based on Grouping User with Probability[J];Acta Electronica Sinica;2003-08
9 ZHAO Yong~1,HE Hong-kun~2 (1.Tianjin Engineering Teachers College,Tianjin,300222;2.Hebei University of Science and Engineering,Tangshan,Hebei,063009);ARM MICROPROCESSOR AND SERIAL COMMUNICATION[J];Hebei Metallurgy;2005-05
10 Tong Tingyang 1 Li Bin 1 Yang Huiping 2 Ning Huansheng 21 (Harbin Institute of Technology,Harbin150000) 2 (Aerospace Golden Card Company,Beijing100044);The Multilayered Encryption System in Digital Control Access[J];Computer Engineering and Applications;2004-08
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved