2008
DOI: 10.1016/j.ins.2007.08.001
|View full text |Cite
|
Sign up to set email alerts
|

Access control in user hierarchy based on elliptic curve cryptosystem

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
41
0

Year Published

2009
2009
2017
2017

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 53 publications
(41 citation statements)
references
References 17 publications
0
41
0
Order By: Relevance
“…Further, our scheme, [8] and [10] are secure against possible attacks as compared to other schemes [5], [7], [11], [13]. However, [8] and [10] require very high storage and computational overheads compared to our scheme.…”
Section: Performance Comparison With Other Schemesmentioning
confidence: 80%
See 2 more Smart Citations
“…Further, our scheme, [8] and [10] are secure against possible attacks as compared to other schemes [5], [7], [11], [13]. However, [8] and [10] require very high storage and computational overheads compared to our scheme.…”
Section: Performance Comparison With Other Schemesmentioning
confidence: 80%
“…Moreover, dynamic access control problems in our scheme are solved efficiently as compared to other schemes. Considering security and low storage and computational complexity, our scheme is significantly better than all other schemes [5], [7], [8], [10], [11], [13].…”
Section: Performance Comparison With Other Schemesmentioning
confidence: 93%
See 1 more Smart Citation
“…To ensure high security and efficiency, Chung et al [22] and Jeng and Wang [23] proposed two efficient solutions for dynamic access problem in a user hierarchy based on elliptic curve cryptosystems recently. Nonetheless, the two scheme in [22,23] use the public polynomials in key generation and derivation phase, which imposes some computational overhead to the schemes since constructing the interpolating polynomials are tremendous. To improve performance further, Nikooghadam et al [2] propose such a new key management scheme for hierarchical access control based on ECC that does not require these polynomials in its structure.…”
Section: Figmentioning
confidence: 99%
“…Due to utilization of the elliptic curve cryptosystem which has a low computational cost and small key size, the three proposed methods in [2,22,23] are superior in both security and efficiency to other schemes in the existing literature. Therefore, we shall compare our proposed scheme to only these there schemes for evaluation of performance.…”
Section: Performance Analysismentioning
confidence: 99%