A time-bound cryptographic key assignment scheme for access control in a hierarchy

被引:101
作者
Tzeng, WG [1 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp & Informat Sci, Hsinchu 30050, Taiwan
关键词
access control; cryptographic key assignment; secure broadcasting; cryptographic key backup;
D O I
10.1109/69.979981
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The cryptographic key assignment problem is to assign cryptographic keys to a set of partially ordered classes so that the cryptographic key of a higher class can be used to derive the cryptographic key of a lower class. In this paper, we propose a time-bound cryptographic key assignment scheme in which the cryptographic keys of a class are different for each time period, that is, the cryptographic key of class C-1 at time t is K-i,K-t. Key derivation is constrained not only by the class relation, but also the time period. In our scheme, each user holds some secret parameters whose number is independent of the number of the classes in the hierarchy and the total time periods. We present two novel applications of our scheme. One is to broadcast data to authorized users in a multilevel-security way and the other is to construct a flexible cryptographic key backup system.
引用
收藏
页码:182 / 188
页数:7
相关论文
共 17 条
[1]   CRYPTOGRAPHIC SOLUTION TO A PROBLEM OF ACCESS-CONTROL IN A HIERARCHY [J].
AKL, SG ;
TAYLOR, PD .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1983, 1 (03) :239-248
[2]  
[Anonymous], 1982, CRYPTOGRAPHY DATA SE, DOI DOI 10.5555/539308
[3]  
BLEICHENBACHER D, 1995, P ADV CRYPTOLOGY CRY, P386
[4]  
CHANDRASEKARAN R, 1992, IFDC SP PUB, V17, P3
[5]   SECURE BROADCASTING USING THE SECURE LOCK [J].
CHIOU, GH ;
CHEN, WT .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1989, 15 (08) :929-930
[6]  
DeLaurentis J.M., 1984, CRYPTOLOGIA, P253
[7]  
Harn L., 1990, Computers & Security, V9, P539, DOI 10.1016/0167-4048(90)90132-D
[8]   An extended theory of Lucas' functions [J].
Lehmer, DH .
ANNALS OF MATHEMATICS, 1930, 31 :419-448
[9]  
MACKINNON SJ, 1985, IEEE T COMPUT, V34, P797, DOI 10.1109/TC.1985.1676635
[10]   Crypto backup and key escrow [J].
Maher, DP .
COMMUNICATIONS OF THE ACM, 1996, 39 (03) :48-53