This Article 
 Bibliographic References 
 Add to: 
Efficient Time-Bound Hierarchical Key Assignment Scheme
October 2004 (vol. 16 no. 10)
pp. 1301-1304
Hung-Yu Chien, IEEE Computer Society
The access privileges in distributed systems can be effectively organized as a hierarchical tree that consists of distinct classes. A hierarchical time-bound key assignment scheme is to assign distinct cryptographic keys to distinct classes according to their privileges so that users from a higher class can use their class key to derive the keys of lower classes, and the keys are different for each time period; therefore, key derivation is constrained by both the class relation and the time period. This paper shall propose, based on a tamper-resistant device, a new time-bound key assignment scheme that greatly improves the computational performance and reduces the implementation cost.

[1] S.G. Akl and P.D. Taylor, Cryptographic Solution to a Problem of Access Control in a Hierarchical ACM Trans. Computer System, vol. 1, no. 3, pp. 239-247, 1983.
[2] L. Harn and H.Y. Lin, A Cryptographic Keys Generation Scheme for Multilevel Data Security Computer Security, vol. 9, pp. 539-546, 1990.
[3] R.S. Sandhu, Cryptographic Implementation of a Tree Hierarchy for Access Control Information Processing Letters, vol. 27, pp. 95-98, 1988.
[4] C.H. Lin, C.C. Chang, and R.C.T. Lee, Hierarchy Representation Based on Arithmetic Coding for Dynamic Information Protection Systems Information Sciences, vol. 64, nos. 1-2, pp. 35-48, Oct. 1992.
[5] H.M. Tsai and C.C. Chang, A Cryptographic Implementation for Dynamic Access Control in a User Hierarchy Computers&Security, vol. 14, pp. 159-166, 1995.
[6] C.H. Lin, Hierarchical Key Assignment without Public-Key Cryptography Computers&Security, vol. 20, no. 7, pp. 612-619, 2001.
[7] M.L. Gemplus, Smart-Cards: A Cost-Effective Solution against Electronic Fraud Proc. European Conf. Security and Detection, no. 437, pp. 81-85, Apr. 1997.
[8] W.G. Tzeng, A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy IEEE Trans. Knowledge and Data Eng., vol. 14, no. 1, pp. 182-188, Jan./Feb. 2002.
[9] V. Dimitrov and T. Cooklev, Two Algorithms for Modular Exponentiation Using Nonstandard Arithmetic IEICE Trans. Fundamentals, vol. E78-A, no. 1, pp. 82-87, 1995.
[10] S.M. Yen and C.S. Laih, Fast Algorithms for LUC Digital Signature Computation Proc. IEEE Computers and Digital Technology, vol. 142, no. 2, pp. 165-169, 1995.
[11] B.M. Macq and J.-J. Quisquater, Cryptology for Digital TV Broadcasting Proc. IEEE, vol. 83, no. 6, pp. 944-957, 1995.
[12] B. Pinkas, Efficient State Updates for Key Management Proc. ACM Workshop on Security and Privacy in Digital Rights Management, Nov. 2001.

Index Terms:
Cryptography, hierarchical key assignment.
Hung-Yu Chien, "Efficient Time-Bound Hierarchical Key Assignment Scheme," IEEE Transactions on Knowledge and Data Engineering, vol. 16, no. 10, pp. 1301-1304, Oct. 2004, doi:10.1109/TKDE.2004.59
Usage of this product signifies your acceptance of the Terms of Use.