Loading…

Hierarchical key management scheme using polynomial interpolation

We present a hierarchical key management scheme using cryptographic hash function and Newton's polynomial interpolation for users key and system resources management. A similar technique has been proposed in 2002 by Shen and Chen, but their scheme suffers large computational overhead and securi...

Full description

Saved in:
Bibliographic Details
Published in:Operating systems review 2005, Vol.39 (1), p.40-47
Main Authors: MANIK LAL DAS, SAXENA, Ashutosh, GULATI, Ved P, PHATAK, Deepak B
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:We present a hierarchical key management scheme using cryptographic hash function and Newton's polynomial interpolation for users key and system resources management. A similar technique has been proposed in 2002 by Shen and Chen, but their scheme suffers large computational overhead and security weakness. We show that our scheme is secure and efficient in comparisons to the Shen and Chen's scheme.
ISSN:0163-5980
1943-586X
DOI:10.1145/1044552.1044556