A novel access control method using Morton number and prime factorization

نویسندگان

  • Henry Ker-Chang Chang
  • Jing-Jang Hwang
  • Hsing-Hua Liu
چکیده

A novel scheme used for controlling access requests in security information system is proposed. In the proposed method, the system administrator chooses distinct prime numbers representing each atomic access right as well as four large prime numbers for encryption. By setting these representative prime numbers as input parameters, the proposed method applies a one-way function combining the Morton number theory transferring into a single value to derive the encrypted compound privilege (ECP). With ECP, veri®cation of right of access can be achieved easily and secretly. Meanwhile, the proposed scheme provides the following advantages: (1) the veri®cation of right of access can be e€ectively implemented using the Morton sequence with coordinate transformation; (2) the problem of dynamic access control also can be e€ectively implemented; (3) integrity and con®dentiality while controlling system resources can be ensured; (4) the proposed method can decrease the redundancy of the access matrix in some speci®c circumstances. Ó 2000 Elsevier Science Inc. All rights reserved.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New Access Control Method Using Prime Factorisation

Based on prime factorisation in number theory, a new but simple and efficient protection method for access control is proposed. This method has several advantages on performance over previous methods in the literature. Especially, a file I user can be added to or removed from the system without much effort. Excellence of this method is more pronounced for those systems where files are accessibl...

متن کامل

Key Generation of Attribute Based Broadcast Encryption

Broadcast Encryption (BE) scheme is allows the sender to securely distribute a data to a dynamically changing set of users over a unsecure channel. Attribute based Broadcast Encryption (ABBE) is a excellent approach for broadcasting. Existing BE classical BE approach required an explicitly specified decrypter list. In ABBE differentiate groups of users by their attribute. In ABBE encrypter enfo...

متن کامل

Quadratic Residues and Their Application

This project explores quadratic residues, a classical number theory topic, using computational techniques. First I conducted computational experiments to investigate the distribution of quadratic residues modulo primes, looking for patterns or evidence against randomness. The experimental data indicates a non-random distribution of quadratic residues. Certain features of such non-random distrib...

متن کامل

Erratum: Prime factorization using quantum annealing and computational algebraic geometry

We investigate prime factorization from two perspectives: quantum annealing and computational algebraic geometry, specifically Gröbner bases. We present a novel autonomous algorithm which combines the two approaches and leads to the factorization of all bi-primes up to just over 200000, the largest number factored to date using a quantum processor. We also explain how Gröbner bases can be used ...

متن کامل

Numerical Study of Bubble Separation and Motion Using Lattice Boltzmann Method

In present paper acombination of three-dimensional isothermal and two-dimensional non-isothermal Lattice Boltzmann Method have been used to simulate the motion of bubble and effect of wetting properties of the surface on bubble separation. By combining these models, three-dimensional model has been used in two-dimension for decreasing the computational cost. Firstly, it has been ensured that th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Inf. Sci.

دوره 130  شماره 

صفحات  -

تاریخ انتشار 2000