Comments on a cryptographic key assignment scheme

Chris J. Mitchell and Tang, Q.

(2004)

Chris J. Mitchell and Tang, Q. (2004) Comments on a cryptographic key assignment scheme. Computer Standards & Interfaces, 27 (3).

Our Full Text Deposits

Full text access: Open

Full Text - 94.32 KB

Links to Copies of this Item Held Elsewhere


Abstract

In this paper, we analyse the security of a cryptographic key assignment scheme, recently proposed by Huang and Chang, that is designed to provide time-constrained hierarchical access control. We show that the new scheme has potential security vulnerabilities, which enable malicious users and attackers to violate the privacy of other users.

Information about this Version

This is a Published version
This version's date is: 08/2004
This item is peer reviewed

Link to this Version

https://repository.royalholloway.ac.uk/items/b10b77b8-e710-30f1-15d2-7a5ab61dbe31/1/

Item TypeJournal Article
TitleComments on a cryptographic key assignment scheme
AuthorsMitchell, Chris
Tang, Q.
Uncontrolled Keywordskey assignment, access control
DepartmentsFaculty of Science\Mathematics

Identifiers

doi10.1016/j.csi.2004.07.001

Deposited by () on 23-Dec-2009 in Royal Holloway Research Online.Last modified on 21-May-2010

Notes

This is the final draft version of the paper that appeared in the journal 'Computer Standards & Interfaces' 27(3), 2004.

References

[1] H.-F. Huang and C.-C. Chang, A new cryptographic key assignment scheme with time-constraint access control in a hierarchy, Computer Standards and Interfaces 26 (2004), pp. 159–166


Details