A note on time-bound hierarchical key assignment schemes