A New Approach for Delegation Using Hierarchical Delegation Tokens
نویسندگان
چکیده
In this paper we give a classiication of delegation schemes into four main classes. To solve the problem with simply chained tokens in cascaded delegations we introduce the concept of hierarchical delegation tokens. To realize this concept we use the Schnorr signature scheme and self{certiied public keys introduced by Girault. We describe the rst approach for hierarchical key generation based on an unregarded idea of G unther and the generation of designated veriier signatures. Using these tools, we present eecient delegation schemes for the four main classes, which are eecient in generating and using delegation keys compared with other existing approaches. This is one of the few works, that combines cryptographic algorithms and protocols to beneet for the complexity and the eeciency of the resulting delegation mechanisms.
منابع مشابه
A Trust Based Delegation System for Managing Access Control
Trust is considered to be a powerful approach for managing access control in pervasive computing scenarios. We introduce a novel delegation system that describes digital trust between users by means of cryptographically secured tokens. The delegation system is organized by the users themselves in a fully distributed manner. A central instance like a public key infrastructure is not required. Th...
متن کاملHierarchical policy delegation in multiple-authority ABE
We present HM-ABE, a hierarchical multi-authority attributebased encryption scheme with policy delegation, that generalizes current work significantly. Current methods require encryptors to build ciphertext access policies themselves, using attributes published by authority domains. This causes problems, both since authorities may not publish sensitive attributes, and since users may not unders...
متن کاملA Role-Based Delegation Model and Some Extensions
In Role-based Access control (RBAC) permissions are associated with roles and users are made members of roles thereby acquiring the associated permissions. User delegation in RBAC is the ability of one user (called the delegating user) who is a member of the delegated role to authorize another user (called the delegate user) to become a member of the delegated role. This paper proposes a simple...
متن کاملDesigning for Flexible Interaction Between Humans and Automation: Delegation Interfaces for Supervisory Control
OBJECTIVE To develop a method enabling human-like, flexible supervisory control via delegation to automation. BACKGROUND Real-time supervisory relationships with automation are rarely as flexible as human task delegation to other humans. Flexibility in human-adaptable automation can provide important benefits, including improved situation awareness, more accurate automation usage, more balanc...
متن کاملSub-delegation and trust
We investigate trust propagation in delegation situations, which often occur in hierarchical organisations and coalition structures. In doing so we define a delegation chain representing the sub-delegation process. Such delegation chains present a problem for current trust evaluation mechanisms, which are unable to accurately divide trust among the chain members, resulting in degraded system pe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1996