A novel key management scheme for dynamic access control in a user hierarchy

Considering the solution of dynamic access problems in a user hierarchy, a novel scheme based on one-way hash function is proposed to manage the cryptographic keys in the paper The scheme attempts to achieve both efficiency and non-iteration in deriving the successor secret key. Besides, the other issues in relation with dynamic access control problems, such as adding/deleting classes, adding/deleting relationships and changing secret keys, can be held good to the scheme. In view of security, a competent central authority must provide the user a convenient way to change his/her key at any time; therefore, the design toward the algorithm in the paper contains such a function. What weight to mention especially among these characteristics of the scheme is the simplification of procedure in changing the private key, and no other current keys need altering simultaneously.

[1]  C T Dinardo,et al.  Computers and security , 1986 .

[2]  Chin-Chen Chang,et al.  Crypographic key assignment scheme for access control in a hierarchy , 1992, Inf. Syst..

[3]  Daryl McCullough,et al.  Specifications for Multi-Level Security and a Hook-Up , 1987, 1987 IEEE Symposium on Security and Privacy.

[4]  Feipei Lai,et al.  Novel Cryptographic Key Assignment Scheme for Dynamic Access Control in a Hierarchy , 1997 .

[5]  F. Kuo,et al.  Cryptographic key assignment scheme for dynamic access control in a user hierarchy , 1999 .

[6]  Selim G. Akl,et al.  An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy , 1985, IEEE Transactions on Computers.

[7]  Tsai Hui-Min,et al.  Refereed paper: A cryptographic implementation for dynamic access control in a user hierarchy , 1995 .

[8]  John B. Kam,et al.  A database encryption system with subkeys , 1981, TODS.

[9]  Ravi S. Sandhu,et al.  Cryptographic Implementation of a Tree Hierarchy for Access Control , 1988, Inf. Process. Lett..

[10]  Selim G. Akl,et al.  Cryptographic solution to a problem of access control in a hierarchy , 1983, TOCS.

[11]  Selim G. Akl,et al.  Views for Multilevel Database Security , 1987, IEEE Transactions on Software Engineering.

[12]  Donald Ervin Knuth,et al.  The Art of Computer Programming , 1968 .

[13]  P. Ribenboim The Book of Prime Number Records , 1988 .

[14]  Alfred Menezes,et al.  Contemporary cryptology—The science of information integrity , 1994 .

[15]  Chinchen Chang,et al.  A cryptographic implementation for dynamic access control in a user hierarchy , 1995, Comput. Secur..

[16]  Stafford E. Tavares,et al.  Flexible Access Control with Master Keys , 1989, CRYPTO.

[17]  L. J. Fraim Scomp: A Solution to the Multilevel Security Problem , 1983, Computer.

[18]  John McHugh,et al.  A Security Policy And Formal Top Level Specification For A Multi-Level Secure Local Area Network , 1986, 1986 IEEE Symposium on Security and Privacy.

[19]  Lein Harn,et al.  A cryptographic key generation scheme for multilevel data security , 1990, Comput. Secur..

[20]  Chu-Hsing Lin,et al.  Dynamic key management schemes for access control in a hierarchy , 1997, Comput. Commun..

[21]  James R. Nechvatal Public-Key Cryptography , 1991 .

[22]  Dorothy E. Denning,et al.  Cryptography and Data Security , 1982 .

[23]  Chin-Chen Chang,et al.  Access control in a hierarchy using a one-way trap door function , 1993 .