Hierarchical key assignment without public-key cryptography

被引:28
作者
Lin, CH [1 ]
机构
[1] Tunghai Univ, Dept Comp Sci & Informat Engn, Taichung 407, Taiwan
关键词
multilevel data security; partially ordered set; access control; key assignment; cryptographic key; user hierarchy; one-way hash functions;
D O I
10.1016/S0167-4048(01)00711-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
VLSI chips make possible the hardware devices employed in today's computing environment for security functions. Controlling access in a hierarchy is an interesting research topic in computer security. Many investigations have been published in the literature with solutions involving assigning cryptographic keys to users at different access clearance levels. However, the existing schemes require a large number of costly arithmetic operations with large integers. This type of system is difficult to implement in a chip with lower computation ability. In this paper, we present a solution, suitable for a low cost chip, to the hierarchical control problem. The proposed scheme has promising characteristics such as high computational efficiency, little required memory in the chip and low cost implementation. This method possesses all of the dynamic properties that appear in existing methods.
引用
收藏
页码:612 / 619
页数:8
相关论文
共 27 条
[11]  
Harn L., 1990, Computers & Security, V9, P539, DOI 10.1016/0167-4048(90)90132-D
[12]  
HORNG G, 1994, P INT COMP S HSINCH, P439
[13]  
LEIGHTON T, 1994, LECT NOTES COMPUTER, V773, P456
[14]  
LIAW HT, 1995, P 5 NAT C INF SEC TA, P88
[15]   Dynamic key management schemes for access control in a hierarchy [J].
Lin, CH .
COMPUTER COMMUNICATIONS, 1997, 20 (15) :1381-1385
[16]  
LIN CH, 1990, J INFORMATION SCI EN, V6, P25
[17]  
LIN CH, 1992, INFORMATION SCHEMES, V64, P35
[18]  
LU WP, 1988, P 1988 INFCOM NEW OR, P1095
[19]  
MACKINNON SJ, 1985, IEEE T COMPUT, V34, P797, DOI 10.1109/TC.1985.1676635
[20]  
Maekawa M., 1987, OPERATING SYSTEMS AD