A hierarchical access control scheme based on Lagrange interpolation for mobile agents
The mobile agent is functioning as an information exchanger with hosts. In order to reduce the communication time that the host sent to the members of a large system. This article proposes to use a function defined by Lagrange polynomial to compute decryption key. Each host will be given a decryptio...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2018-07-01
|
Series: | International Journal of Distributed Sensor Networks |
Online Access: | https://doi.org/10.1177/1550147718790892 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832547209946595328 |
---|---|
author | Tsung-Chih Hsiao Zhen-Yu Wu Tzer-Long Chen Yu-Fang Chung Tzer-Shyong Chen |
author_facet | Tsung-Chih Hsiao Zhen-Yu Wu Tzer-Long Chen Yu-Fang Chung Tzer-Shyong Chen |
author_sort | Tsung-Chih Hsiao |
collection | DOAJ |
description | The mobile agent is functioning as an information exchanger with hosts. In order to reduce the communication time that the host sent to the members of a large system. This article proposes to use a function defined by Lagrange polynomial to compute decryption key. Each host will be given a decryption key to access the confidential document by inputting a secret key into an interpolation function which is generated from Lagrange interpolation. Since tasks are done by the mobile agent, the whole process will be performed within a short time period because there is no physical connection between the end devices. The information exchange occurs at the end hosts. |
format | Article |
id | doaj-art-3490701e1d5a41e1ab140387371197e0 |
institution | Kabale University |
issn | 1550-1477 |
language | English |
publishDate | 2018-07-01 |
publisher | Wiley |
record_format | Article |
series | International Journal of Distributed Sensor Networks |
spelling | doaj-art-3490701e1d5a41e1ab140387371197e02025-02-03T06:45:34ZengWileyInternational Journal of Distributed Sensor Networks1550-14772018-07-011410.1177/1550147718790892A hierarchical access control scheme based on Lagrange interpolation for mobile agentsTsung-Chih Hsiao0Zhen-Yu Wu1Tzer-Long Chen2Yu-Fang Chung3Tzer-Shyong Chen4College of Computer Science and Technology, Huaqiao University, Xiamen, ChinaDepartment of Information Management, National Penghu University of Science and Technology, Magong, TaiwanDepartment of Information Technology, Ling Tung University, Taichung, TaiwanDepartment of Electrical Engineering, Tunghai University, Taichung, TaiwanDepartment of Information Management, Tunghai University, Taichung, TaiwanThe mobile agent is functioning as an information exchanger with hosts. In order to reduce the communication time that the host sent to the members of a large system. This article proposes to use a function defined by Lagrange polynomial to compute decryption key. Each host will be given a decryption key to access the confidential document by inputting a secret key into an interpolation function which is generated from Lagrange interpolation. Since tasks are done by the mobile agent, the whole process will be performed within a short time period because there is no physical connection between the end devices. The information exchange occurs at the end hosts.https://doi.org/10.1177/1550147718790892 |
spellingShingle | Tsung-Chih Hsiao Zhen-Yu Wu Tzer-Long Chen Yu-Fang Chung Tzer-Shyong Chen A hierarchical access control scheme based on Lagrange interpolation for mobile agents International Journal of Distributed Sensor Networks |
title | A hierarchical access control scheme based on Lagrange interpolation for mobile agents |
title_full | A hierarchical access control scheme based on Lagrange interpolation for mobile agents |
title_fullStr | A hierarchical access control scheme based on Lagrange interpolation for mobile agents |
title_full_unstemmed | A hierarchical access control scheme based on Lagrange interpolation for mobile agents |
title_short | A hierarchical access control scheme based on Lagrange interpolation for mobile agents |
title_sort | hierarchical access control scheme based on lagrange interpolation for mobile agents |
url | https://doi.org/10.1177/1550147718790892 |
work_keys_str_mv | AT tsungchihhsiao ahierarchicalaccesscontrolschemebasedonlagrangeinterpolationformobileagents AT zhenyuwu ahierarchicalaccesscontrolschemebasedonlagrangeinterpolationformobileagents AT tzerlongchen ahierarchicalaccesscontrolschemebasedonlagrangeinterpolationformobileagents AT yufangchung ahierarchicalaccesscontrolschemebasedonlagrangeinterpolationformobileagents AT tzershyongchen ahierarchicalaccesscontrolschemebasedonlagrangeinterpolationformobileagents AT tsungchihhsiao hierarchicalaccesscontrolschemebasedonlagrangeinterpolationformobileagents AT zhenyuwu hierarchicalaccesscontrolschemebasedonlagrangeinterpolationformobileagents AT tzerlongchen hierarchicalaccesscontrolschemebasedonlagrangeinterpolationformobileagents AT yufangchung hierarchicalaccesscontrolschemebasedonlagrangeinterpolationformobileagents AT tzershyongchen hierarchicalaccesscontrolschemebasedonlagrangeinterpolationformobileagents |