Research Article

[Retracted] A Novel Hierarchical Key Assignment Scheme for Data Access Control in IoT

Table 1

Security comparison among some existing HKASs.

SchemeSecurity assumptionSecure against collusive attackSecure against sibling attackSecure against collaborative attackForward securityBackward security

Hwang-Yang scheme [19]Integers factorization
Lo et al.’s scheme [21]PKE with CPA-secure and hash function
Jeng and Wang scheme [24]ECC
Chung et al.’s scheme [25]ECC and hash function
Our schemeCMDH and DMDH