Hash Vine: A New Hash Structure for Scalable Generation of Hierarchical Hash Codes

In this paper, we present a new idea of multidimensional and multi-layered hash structure (Hash Vine) that can be used to fast generate the hierarchical hash codes for structures of arbitrary shape/size. The hash codes generated by Hash Vine can be used for many different purposes such as product/package authentication in the supply chain, identity/access right authentication of an individual in a hierarchical organization, and for the security of any multi-layered hierarchical big data. The Hash Vine can generate the hash codes very efficiently, yet effectively to make it simple and smooth to generate organic hash codes that can be used as seed codes for various hash chains at big scale. The computational results confirm that our algorithm can generate effective hash codes by showing that each generated hash code under the same root seed code can generate a significantly long hash chain with a negligible rate of collision between the hash codes under the same root seed code. The algorithmic analysis proves that our algorithm requires the minimal computational complexity.

[1]  Ashutosh Saxena,et al.  Hierarchical key management scheme using polynomial interpolation , 2005, OPSR.

[2]  Selim G. Akl,et al.  Cryptographic solution to a problem of access control in a hierarchy , 1983, TOCS.

[3]  Celia Li,et al.  Access control in a hierarchy using one-way hash functions , 2004, Comput. Secur..

[4]  Marina Blanton,et al.  Dynamic and Efficient Key Management for Access Hierarchies , 2009, TSEC.

[5]  Pingzhi Fan,et al.  Access key distribution scheme for level-based hierarchy , 2003, Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies.

[6]  T. Hardjono Sibling Intractable Function Families and Their Applications 1 , 1992 .

[7]  Alfredo De Santis,et al.  Cryptographic key assignment schemes for any access control policy , 2004, Inf. Process. Lett..

[8]  Masaaki Fujiyoshi,et al.  Efficient collusion attack-free access control for multidimensionally hierarchical scalability content , 2009, 2009 IEEE International Symposium on Circuits and Systems.

[9]  Chang Wen Chen,et al.  A collusion resilient key management scheme for multi-dimensional scalable media access control , 2011, 2011 18th IEEE International Conference on Image Processing.

[10]  Jin Li,et al.  Hierarchical and Shared Access Control , 2016, IEEE Transactions on Information Forensics and Security.

[11]  Usman Tariq,et al.  Polynomial-based key management for secure intra-group and inter-group communication , 2013, Comput. Math. Appl..

[12]  K.R. Ramkumar,et al.  Key management using Chebyshev polynomials for mobile ad hoc networks , 2017, China Communications.

[13]  Alfredo De Santis,et al.  Efficient Provably-Secure Hierarchical Key Assignment Schemes , 2007, MFCS.

[14]  Dorothy E. Denning,et al.  Cryptography and Data Security , 1982 .

[15]  G. Amdhal,et al.  Validity of the single processor approach to achieving large scale computing capabilities , 1967, AFIPS '67 (Spring).

[16]  Shoko Imaizumi A collusion-free key assignment scheme for hierarchical access control using recursive hash chains , 2013, 2013 IEEE International Symposium on Circuits and Systems (ISCAS2013).

[17]  Selim G. Akl,et al.  An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy , 1985, IEEE Transactions on Computers.

[18]  Ravi S. Sandhu,et al.  Cryptographic Implementation of a Tree Hierarchy for Access Control , 1988, Inf. Process. Lett..

[19]  Lein Harn,et al.  A cryptographic key generation scheme for multilevel data security , 1990, Comput. Secur..

[20]  Wei-Pang Yang,et al.  Controlling access in large partially ordered hierarchies using cryptographic keys , 2003, J. Syst. Softw..

[21]  Stafford E. Tavares,et al.  Flexible Access Control with Master Keys , 1989, CRYPTO.

[22]  Jason Crampton,et al.  Cryptographically-enforced hierarchical access control with multiple keys , 2009, J. Log. Algebraic Methods Program..

[23]  Marc Joye,et al.  One-Way Cross-Trees and Their Applications , 2002, Public Key Cryptography.

[24]  Alfredo De Santis,et al.  New constructions for provably-secure time-bound hierarchical key assignment schemes , 2008, Theor. Comput. Sci..

[25]  Jennifer Seberry,et al.  New Solutions to the Problem of Access Control in a Hierarchy , 1993 .

[26]  Indrajit Ray,et al.  A cryptographic solution to implement access control in a hierarchy and more , 2002, SACMAT '02.