An Asymmetric Cryptographic Key Assignment Scheme for Access Control in Tree Structural Hierarchies
نویسندگان
چکیده
In a hierarchical structure, a user in a security class has access to information items of another class if and only if the former class is a predecessor of latter. Based upon cryptographic techniques, several schemes have been proposed for solving the problem of access control in hierarchical structures. In this paper, we propose a new scheme for an access control in tree structural hierarchies based on asymmetric cryptographic key assignment scheme. Further, our encryption and decryption procedures are based on asymmetric cryptographic technique. We show that proposed scheme requires less amount of storage space to store public parameters and also retains the same security level compared to the previous published schemes. Furthermore, our scheme achieves better generality compared to the Hwang’s scheme.
منابع مشابه
Cryptographic key assignment schemes for any access control policy
The access control problem deals with the management of sensitive information among a number of users who are classified according to their suitability in accessing the information in a computer system. The set of rules that specify the information flow between different user classes in the system defines an access control policy. Akl and Taylor first considered the access control problem in a ...
متن کاملAn Improvement of Novel Cryptographic Key Assignment Scheme for Dynamic Access Control in a Hierarchy
This letter presents a cryptographic key assignment scheme for dynamic access control in a hierarchy. A scheme for extending a previous cryptographic key assignment scheme to reduce the computation required for key generation and derivation algorithms is also proposed.
متن کاملA Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security
In a hierarchical structure, a user in a security class has access to information items of security classes of lower levels, but not of upper levels. Based upon cryptographic techniques, several schemes have been proposed for solving the problem of access control in hierarchal structures, which are based on only one cryptographic assumption. In this paper, we propose a scheme for access control...
متن کاملA New Cryptographic Key Assignment Scheme using a One-way Hash Function
Access control in a hierarchy plays an important role in today’s communication networks. To guarantee the quality of communication services it is necessary to construct a low-computation dynamic access control scheme for the use to obtain the secure information. Therefore, we propose an efficient identity-based cryptographic key assignment scheme in which the cryptographic key of each user is c...
متن کاملComments on a cryptographic key assignment scheme
In this paper we analyse the security of a cryptographic key assignment scheme, recently proposed by Huang and Chang, that is designed to provide time-constrained hierarchical access control. We show that the new scheme has potential security vulnerabilities, which enable malicious users and attackers to violate the privacy of other users. keywords: Key assignment, Access control.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- I. J. Network Security
دوره 4 شماره
صفحات -
تاریخ انتشار 2007