2011
DOI: 10.1016/j.ins.2010.09.033
|View full text |Cite
|
Sign up to set email alerts
|

An efficient key assignment scheme for access control in a large leaf class hierarchy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
4
4
1

Relationship

1
8

Authors

Journals

citations
Cited by 16 publications
(8 citation statements)
references
References 23 publications
(19 reference statements)
0
8
0
Order By: Relevance
“…ereafter, many researchers proposed numerous dependent key schemes [15][16][17][18][19]. One of the main approaches to construct a dependent key scheme is to use a prime number's fundamental properties [13,20,21], which brings in some additional drawbacks, such as large public information, vulnerable to GCD operation and collusive attack [22,23]. anks to the lower computation overhead and smaller key size, elliptic curve cryptosystem (ECC) was devoted to constructing the dependent key schemes in [24,25].…”
Section: Introductionmentioning
confidence: 99%
“…ereafter, many researchers proposed numerous dependent key schemes [15][16][17][18][19]. One of the main approaches to construct a dependent key scheme is to use a prime number's fundamental properties [13,20,21], which brings in some additional drawbacks, such as large public information, vulnerable to GCD operation and collusive attack [22,23]. anks to the lower computation overhead and smaller key size, elliptic curve cryptosystem (ECC) was devoted to constructing the dependent key schemes in [24,25].…”
Section: Introductionmentioning
confidence: 99%
“…Atallah et al (2005Atallah et al ( , 2009) also proposed a dynamic efficient access control scheme based on one-way hash function. However, as pointed out in Lo et al (2011), their scheme is not suitable for a deep tree structural hierarchy or in a situation where a tree contains the complex relationships.…”
Section: Figurementioning
confidence: 99%
“…Atallah et al proposed a dynamic efficient access control scheme [3], [4] based on one-way hash functions. However, as pointed out in [9], their scheme is not suitable for a deep tree hierarchy or in a situation where a tree contains complex relationships.…”
Section: Related Workmentioning
confidence: 99%