Efficient Key Assignment for Hierarchical Access Control using One-way Hash Function

نویسنده

  • Shaohua Tang
چکیده

An efficient hierarchical key assignment scheme for access control based on one-way hash function is proposed, which allows the user in a security class to derive the keys of its subordinating classes, so that the superior class can access the information encrypted and owned by its subordinating classes. This scheme is also flexible to change the hierarchical relationship among security classes, for example, it is not difficult to add new security classes to the hierarchy, or to delete security classes from the hierarchy dynamically. By analysis and comparison, it is shown that some features, such as efficiency, extensibility, and security, are possessed by this scheme. Key-Words: key assignment, hierarchicy, access control, multilevel security, hash function, cryptography

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Access control in a hierarchy using one-way hash functions

This paper presents a cryptographic key management solution to solve the access control problem in a hierarchy. Based on one-way hash functions, an efficient key assignment and derivation method is proposed. This solution uses limited number of keys and hash functions. Also, the dynamic access control problems, such as adding/deleting nodes, or modifying relationships between nodes in the hiera...

متن کامل

A New Cryptographic Key Assignment Scheme using a One-way Hash Function

Access control in a hierarchy plays an important role in today’s communication networks. To guarantee the quality of communication services it is necessary to construct a low-computation dynamic access control scheme for the use to obtain the secure information. Therefore, we propose an efficient identity-based cryptographic key assignment scheme in which the cryptographic key of each user is c...

متن کامل

Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)

One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...

متن کامل

A Novel Dynamic Role-Based Access Control Scheme in User Hierarchy

Role-based access control is an important mechanism to prevent the unauthorized access in terms of roles. User hierarchy is an efficient structure to express the relations between different roles. The combination between role-based access control and the user hierarchy is required in different context, especially in open internet environment where the published or delegated data are encrypted f...

متن کامل

Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes

Hierarchical Key Assignment Schemes can be used to enforce access control policies by cryptographic means. In this paper, we present a new, enhanced security model for such schemes. We also give simple, efficient, and strongly-secure constructions for Hierarchical Key Assignment Schemes for arbitrary hierarchies using pseudorandom functions and forwardsecure pseudorandom generators. We compare ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006