• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

J4 ›› 2010, Vol. 32 ›› Issue (2): 49-52.doi: 10.3969/j.issn.1007130X.2010.

• 论文 • Previous Articles     Next Articles

Hierarchical Secure Communications in Computer Networks

  

  1. (National Laboratory for Modern Communications,Chengdu 610041,China)
  • Received:2008-08-26 Revised:2008-12-12 Online:2010-01-25 Published:2010-01-26

Abstract:

TCG(trusted computing group) develops a series of technical specifications[1],but it does not deal with the problem of hierarchical key assignment. This problem has been solved in reference [2].But in [2],the users of the same level use the same key and any user of the higher level uses the key of the user(of the lower level) in secure communications,which is undesirable in some cases. In this paper,we give two methods,by which the users can securely communicate with the users of the same level or the users of the lower level using different keys,and can not securely communicate with the users of the higher level.

Key words: hierarchical;elliptic curve;key;Weil pairing

CLC Number: