Loading…
Hierarchical key management scheme using polynomial interpolation
We present a hierarchical key management scheme using cryptographic hash function and Newton's polynomial interpolation for users key and system resources management. A similar technique has been proposed in 2002 by Shen and Chen, but their scheme suffers large computational overhead and securi...
Saved in:
Published in: | Operating systems review 2005, Vol.39 (1), p.40-47 |
---|---|
Main Authors: | , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | We present a hierarchical key management scheme using cryptographic hash function and Newton's polynomial interpolation for users key and system resources management. A similar technique has been proposed in 2002 by Shen and Chen, but their scheme suffers large computational overhead and security weakness. We show that our scheme is secure and efficient in comparisons to the Shen and Chen's scheme. |
---|---|
ISSN: | 0163-5980 1943-586X |
DOI: | 10.1145/1044552.1044556 |