A New Approach for Delegation Using Hierarchical Delegation Tokens

نویسندگان

  • Yun Ding
  • Patrick Horster
  • Holger Petersen
چکیده

In this paper we give a classiication of delegation schemes into four main classes. To solve the problem with simply chained tokens in cascaded delegations we introduce the concept of hierarchical delegation tokens. To realize this concept we use the Schnorr signature scheme and self{certiied public keys introduced by Girault. We describe the rst approach for hierarchical key generation based on an unregarded idea of G unther and the generation of designated veriier signatures. Using these tools, we present eecient delegation schemes for the four main classes, which are eecient in generating and using delegation keys compared with other existing approaches. This is one of the few works, that combines cryptographic algorithms and protocols to beneet for the complexity and the eeciency of the resulting delegation mechanisms.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Trust Based Delegation System for Managing Access Control

Trust is considered to be a powerful approach for managing access control in pervasive computing scenarios. We introduce a novel delegation system that describes digital trust between users by means of cryptographically secured tokens. The delegation system is organized by the users themselves in a fully distributed manner. A central instance like a public key infrastructure is not required. Th...

متن کامل

Hierarchical policy delegation in multiple-authority ABE

We present HM-ABE, a hierarchical multi-authority attributebased encryption scheme with policy delegation, that generalizes current work significantly. Current methods require encryptors to build ciphertext access policies themselves, using attributes published by authority domains. This causes problems, both since authorities may not publish sensitive attributes, and since users may not unders...

متن کامل

A Role-Based Delegation Model and Some Extensions

In Role-based Access control (RBAC) permissions are associated with roles and users are made members of roles thereby acquiring the associated permissions. User delegation in RBAC is the ability of one user (called the delegating user) who is a member of the delegated role to authorize another user (called the delegate user) to become a member of the delegated role. This paper proposes a simple...

متن کامل

Designing for Flexible Interaction Between Humans and Automation: Delegation Interfaces for Supervisory Control

OBJECTIVE To develop a method enabling human-like, flexible supervisory control via delegation to automation. BACKGROUND Real-time supervisory relationships with automation are rarely as flexible as human task delegation to other humans. Flexibility in human-adaptable automation can provide important benefits, including improved situation awareness, more accurate automation usage, more balanc...

متن کامل

Sub-delegation and trust

We investigate trust propagation in delegation situations, which often occur in hierarchical organisations and coalition structures. In doing so we define a delegation chain representing the sub-delegation process. Such delegation chains present a problem for current trust evaluation mechanisms, which are unable to accurately divide trust among the chain members, resulting in degraded system pe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1996