An asymmetric cryptographuic key assignment scheme for access control in totally-ordered hierarchies

Many methods based on cryptography have been proposed to solve the problem of access control in hierarchic structures. However, these schemes are only used in symmetric (or one-key) cryptosystems. In this article, we propose a new multilevel access control scheme for a totally-ordered hierarchy that can be used in asymmetric (or two-key) cryptosystem. It is well known that there are two main advantages in asymmetric cryptography: key distribution and authentication. Our scheme is, to our best knowledge, the first to be used as an asymmetric cryptosystem.

[1]  Chin-Chen Chang,et al.  Modified Chang-Hwang-Wu access control scheme , 1993 .

[2]  Chin-Chen Chang,et al.  Crypographic key assignment scheme for access control in a hierarchy , 1992, Inf. Syst..

[3]  Lein Harn,et al.  A cryptographic key generation scheme for multilevel data security , 1990, Comput. Secur..

[4]  Selim G. Akl,et al.  Cryptographic Solution to a Multilevel Security Problem , 1982, CRYPTO.

[5]  Selim G. Akl,et al.  Cryptographic solution to a problem of access control in a hierarchy , 1983, TOCS.

[6]  Selim G. Akl,et al.  An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy , 1985, IEEE Transactions on Computers.

[7]  Min-Shiang Hwang,et al.  An Improvement of Novel Cryptographic Key Assignment Scheme for Dynamic Access Control in a Hierarchy , 1999 .

[8]  Whitfield Diffie The first ten years of public-key cryptography , 1988 .

[9]  Min-Shiang Hwang An improvement of a dynamic cryptographic key assignment scheme in a tree hierarchy , 1999 .

[10]  Ravi S. Sandhu,et al.  Cryptographic Implementation of a Tree Hierarchy for Access Control , 1988, Inf. Process. Lett..

[11]  Hwang Min-Shiang,et al.  A cryptographic key assignment scheme in a hierarchy for access control , 1997 .

[12]  J. H. Moore Protocol failures in cryptosystems , 1988, Proc. IEEE.

[13]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[14]  Dorothy E. Denning,et al.  Cryptography and Data Security , 1982 .

[15]  M. Rabin DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .

[16]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.