Hierarchical key assignment without public-key cryptography

被引:28
作者
Lin, CH [1 ]
机构
[1] Tunghai Univ, Dept Comp Sci & Informat Engn, Taichung 407, Taiwan
关键词
multilevel data security; partially ordered set; access control; key assignment; cryptographic key; user hierarchy; one-way hash functions;
D O I
10.1016/S0167-4048(01)00711-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
VLSI chips make possible the hardware devices employed in today's computing environment for security functions. Controlling access in a hierarchy is an interesting research topic in computer security. Many investigations have been published in the literature with solutions involving assigning cryptographic keys to users at different access clearance levels. However, the existing schemes require a large number of costly arithmetic operations with large integers. This type of system is difficult to implement in a chip with lower computation ability. In this paper, we present a solution, suitable for a low cost chip, to the hierarchical control problem. The proposed scheme has promising characteristics such as high computational efficiency, little required memory in the chip and low cost implementation. This method possesses all of the dynamic properties that appear in existing methods.
引用
收藏
页码:612 / 619
页数:8
相关论文
共 27 条
[1]   CRYPTOGRAPHIC SOLUTION TO A PROBLEM OF ACCESS-CONTROL IN A HIERARCHY [J].
AKL, SG ;
TAYLOR, PD .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1983, 1 (03) :239-248
[2]  
[Anonymous], 1982, CRYPTOGRAPHY DATA SE, DOI DOI 10.5555/539308
[3]  
CHANDRASEKARAN R, 1992, IFDC SP PUB, V17, P3
[4]   A SCHEME TO DETERMINE THE RELATIONSHIP BETWEEN 2 USERS IN A HIERARCHY [J].
CHANG, CC ;
JAN, JK ;
BUEHRER, DJ .
COMPUTERS & SECURITY, 1994, 13 (03) :255-261
[5]   ACCESS-CONTROL IN A HIERARCHY USING A ONE-WAY TRAP DOOR FUNCTION [J].
CHANG, CC ;
BUEHRER, DJ .
COMPUTERS & MATHEMATICS WITH APPLICATIONS, 1993, 26 (05) :71-76
[6]  
CHANG CC, 1994, T INFORMATION PROCES, V35, P2189
[7]   A DATABASE ENCRYPTION SYSTEM WITH SUBKEYS [J].
DAVIDA, GI ;
WELLS, DL ;
KAM, JB .
ACM TRANSACTIONS ON DATABASE SYSTEMS, 1981, 6 (02) :312-328
[8]  
Denning D. E., 1984, Proceedings of the 1984 Symposium on Security and Privacy, P52
[9]  
Denning D. E., 1986, Proceedings of the 1986 IEEE Symposium on Security and Privacy (Cat. No.86CH2292-1), P156
[10]  
FRAIM LJ, 1983, IEEE COMPUTER JUL, P26