Controlling access in large partially ordered hierarchies using cryptographic keys

The problem of access control in a hierarchy is present in many application areas. Since computing resources have grown tremendously, access control is more frequently required in areas such as computer networks, database management systems, and operating systems. Many schemes based on cryptography have been proposed to solve this problem. However, previous schemes need large values associated with each security class. In this paper, we propose a new scheme to solve this problem achieving the following two goals. One is that the number of keys is reduced without affecting the security of the system. The other goal is that when a security class is added to the system, we need only update a few keys of the related security classes with simple operations.

[1]  Min-Shiang Hwang An asymmetric cryptographuic key assignment scheme for access control in totally-ordered hierarchies , 2000, Int. J. Comput. Math..

[2]  Chin-Chen Chang,et al.  Crypographic key assignment scheme for access control in a hierarchy , 1992, Inf. Syst..

[3]  Selim G. Akl,et al.  Cryptographic solution to a problem of access control in a hierarchy , 1983, TOCS.

[4]  James A. Reeds,et al.  Multilevel security in the UNIX tradition , 1992, Softw. Pract. Exp..

[5]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[6]  John M. DeLaurentis,et al.  A Further Weakness in the Common Modulus Protocol for the RSA Cryptoalgorithm , 1984, Cryptologia.

[7]  Chin-Chen Chang,et al.  Parallel computation of the generating keys for RSA cryptosystems , 1996 .

[8]  C. Lei,et al.  A dynamic cryptographic key assignment scheme in a tree structure , 1993 .

[9]  Malur K. Sundareshan,et al.  A Model for Multilevel Security in Computer Networks , 1990, IEEE Trans. Software Eng..

[10]  D. Elliott Bell,et al.  Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .

[11]  Lein Harn,et al.  A cryptographic key generation scheme for multilevel data security , 1990, Comput. Secur..

[12]  Hwang Min-Shiang,et al.  A cryptographic key assignment scheme in a hierarchy for access control , 1997 .

[13]  Chin-Chen Chang,et al.  Modified Chang-Hwang-Wu access control scheme , 1993 .

[14]  Selim G. Akl,et al.  Views for Multilevel Database Security , 1986, 1986 IEEE Symposium on Security and Privacy.

[15]  Daryl McCullough,et al.  Specifications for Multi-Level Security and a Hook-Up , 1987, 1987 IEEE Symposium on Security and Privacy.

[16]  Ravi S. Sandhu,et al.  Cryptographic Implementation of a Tree Hierarchy for Access Control , 1988, Inf. Process. Lett..

[17]  Malur K. Sundareshan,et al.  Enhanced protocols for hierarchical encryption key management for secure communication in internet environments , 1992, IEEE Trans. Commun..

[18]  Min-Shiang Hwang Cryptanalysis of YCN key assignment scheme in a hierarchy , 2000, Inf. Process. Lett..

[19]  Min-Shiang Hwang An improvement of a dynamic cryptographic key assignment scheme in a tree hierarchy , 1999 .

[20]  Chin-Laung Lei,et al.  An optimal algorithm to assign cryptographic keys in a tree structure for access control , 1993, BIT.

[21]  Min-Shiang Hwang,et al.  Cryptanalysis of the Batch Verifying Multiple RSA Digital Signatures , 2000, Informatica.

[22]  Selim G. Akl,et al.  An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy , 1985, IEEE Transactions on Computers.

[23]  Chyi Hwang,et al.  An FFT-based algorithm for 2D power series expansions , 1999 .

[24]  John McHugh,et al.  A Security Policy And Formal Top Level Specification For A Multi-Level Secure Local Area Network , 1986, 1986 IEEE Symposium on Security and Privacy.

[25]  Dorothy E. Denning Cryptographic Checksums for Multilevel Database Security , 1984, 1984 IEEE Symposium on Security and Privacy.

[26]  L. J. Fraim Scomp: A Solution to the Multilevel Security Problem , 1983, Computer.

[27]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[28]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[29]  Min-Shiang Hwang Extension of CHW cryptographic key assignment scheme in a hierarchy , 1999 .