Chris J. Mitchell and Tang, Q. (2004) Comments on a cryptographic key assignment scheme. Computer Standards & Interfaces, 27 (3).
Full text access: Open
In this paper, we analyse the security of a cryptographic key assignment scheme, recently proposed by Huang and Chang, that is designed to provide time-constrained hierarchical access control. We show that the new scheme has potential security vulnerabilities, which enable malicious users and attackers to violate the privacy of other users.
This is a Published version This version's date is: 08/2004 This item is peer reviewed
https://repository.royalholloway.ac.uk/items/b10b77b8-e710-30f1-15d2-7a5ab61dbe31/1/
Deposited by () on 23-Dec-2009 in Royal Holloway Research Online.Last modified on 21-May-2010
This is the final draft version of the paper that appeared in the journal 'Computer Standards & Interfaces' 27(3), 2004.
[1] H.-F. Huang and C.-C. Chang, A new cryptographic key assignment scheme with time-constraint access control in a hierarchy, Computer Standards and Interfaces 26 (2004), pp. 159â166