A hierarchical access control scheme based on Lagrange interpolation for mobile agents
Open Access
- 27 July 2018
- journal article
- research article
- Published by SAGE Publications in International Journal of Distributed Sensor Networks
- Vol. 14 (7)
- https://doi.org/10.1177/1550147718790892
Abstract
The mobile agent is functioning as an information exchanger with hosts. In order to reduce the communication time that the host sent to the members of a large system. This article proposes to use a function defined by Lagrange polynomial to compute decryption key. Each host will be given a decryption key to access the confidential document by inputting a secret key into an interpolation function which is generated from Lagrange interpolation. Since tasks are done by the mobile agent, the whole process will be performed within a short time period because there is no physical connection between the end devices. The information exchange occurs at the end hosts.Keywords
Funding Information
- The Natural Science Foundation of Fujian Province of China (Nos. 2017J01109)
- The Science & Technology Planning Fund of Quanzhou (Nos. 2016T009)
This publication has 9 references indexed in Scilit:
- A Framework of Secured Embedding Scheme Using Vector Discrete Wavelet Transformation and Lagrange InterpolationJournal of Computer Networks and Communications, 2018
- Cryptographic Hierarchical Access Control for Dynamic StructuresIEEE Transactions on Information Forensics and Security, 2016
- Achieving Simple, Secure and Efficient Hierarchical Access Control in Cloud ComputingInternational Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2015
- The Application of RFID Monitoring Technology to Patrol Management System in Petrochemical IndustryWireless Personal Communications, 2014
- Quality Control of Lead-Acid Battery according to Its Condition Test for UPS Supplier and ManufacturersMathematical Problems in Engineering, 2014
- Hierarchical key management scheme using polynomial interpolationACM SIGOPS Operating Systems Review, 2005
- Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchyComputers & Security, 2003
- A Novel Key Management Scheme Based on Discrete Logarithms and Polynomial InterpolationsComputers & Security, 2002
- New directions in cryptographyIEEE Transactions on Information Theory, 1976