ACCESS-CONTROL IN A HIERARCHY USING A ONE-WAY TRAP DOOR FUNCTION

被引:22
作者
CHANG, CC
BUEHRER, DJ
机构
[1] Institute of Computer Science, Information Engineering National Chung Cheng University, Chiayi
关键词
D O I
10.1016/0898-1221(93)90075-7
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Often a security system groups users into a hierarchy, with user classes on top having access to objects of user classes below them. Previously proposed cryptographic schemes [1-6] assign & key to each user class. Any user can compute from his key the keys of all user classes who are below him in the hierarchy, thus giving him their access privileges. Moreover, these schemes prevent the possibility of users collaborating to compute a key to which they are not entitled. The major disadvantage of the proposed schemes is that it is not easy to add a new user without having to change most of the previously defined keys. The other major disadvantage is the amount of storage it takes to store the keys. In this paper, we overcome these problems whenever the number of user classes is large and the hierarchical structure is non-skewed. The proposed algorithm, inspired by a remarkable concept invented by S. J. MacKinnon et al. [5], also permits a user to access all files of users who are below him in the class hierarchy. It makes it easy, however, to add new user keys without affecting most of the previously-assigned keys.
引用
收藏
页码:71 / 76
页数:6
相关论文
共 7 条
[1]   CRYPTOGRAPHIC SOLUTION TO A PROBLEM OF ACCESS-CONTROL IN A HIERARCHY [J].
AKL, SG ;
TAYLOR, PD .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1983, 1 (03) :239-248
[2]  
AKL SG, 1982, ADV CRYPTOLOGY, P237
[3]  
Denning D.E.R., 1982, CRYPTOGRAPHY DATA SE, V112, DOI [10.5555/539308, DOI 10.5555/539308]
[4]  
MACKINNON SJ, 1985, IEEE T COMPUT, V34, P797, DOI 10.1109/TC.1985.1676635
[5]  
MACKINNON SJ, 1983, IEEE S SECURITY PRIV, P72
[6]  
RIVEST RL, 1978, COMMUN ACM, V21, P120, DOI [10.1145/359340.359342, 10.1145/357980.358017]
[7]   CRYPTOGRAPHIC IMPLEMENTATION OF A TREE HIERARCHY FOR ACCESS-CONTROL [J].
SANDHU, RS .
INFORMATION PROCESSING LETTERS, 1988, 27 (02) :95-98