An Access Control Mechanism Based on the Generalized Aryabhata Remainder Theorem

نویسندگان

  • Yanjun Liu
  • Chin-Chen Chang
  • Shih-Chang Chang
چکیده

An access control mechanism is a technology to protect the confidential files stored in a database by restricting the access rights of different approved users of these files. In this paper, we propose a novel access control mechanism using the single-key-lock system and the generalized Aryabhata remainder theorem (GART), in which each user is associated with a key and each digital file with a lock. Our mechanism possesses three unique features, 1) a high efficiency of constructing the keys for the users and the locks for the files; 2) a simple operation on the user’s key and on the file’s lock allows the user access to the file; and 3) the keys for adding or deleting a user can be updated easily without affecting the existing keys for other users.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Group Key Distribution System Based on the Generalized Aryabhata Remainder Theorem for Enterprise Digital Rights Management

Digital Rights Management (DRM) is a type of access-control technology that is used by diverse content providers to restrict the use of digital content. Enterprise Digital Rights Management (E-DRM) is an application of DRM techniques for managing the control of access to sensitive documents in an enterprise. In this paper, we propose a group key distribution system for E-DRM based on the concep...

متن کامل

A Database Encryption Scheme Based on the Generalized Aryabhata Remainder Theorem

Database security prevents the disclosure of confidential data within a database to unauthorized users, and has become an urgent challenge for a tremendous number of database applications. Data encryption is a widely-used cryptographic technique for realizing database security in which the data kept in the database are encrypted into ciphertext. Inspired by Lin et al.’s database encryption syst...

متن کامل

Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)

One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...

متن کامل

An Efficient Oblivious Transfer Protocol Using Residue Number System

Because the t-out-of-n oblivious transfer (OT) protocol can guarantee the privacy of both participants, i.e., the sender and the receiver, it has been used extensively in the study of cryptography. Recently, Chang and Lee presented a robust t-out-of-n OT protocol based on the Chinese remainder theorem (CRT). In this paper, we use the Aryabhata remainder theorem (ART) to achieve the functionalit...

متن کامل

Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication

Secure group communication with hierarchical access control refers to a scenario where a group of members is divided into a number of subgroups located at different privilege levels and a high-level subgroup can receive and decrypt messages within any of its descendant lower-level subgroups; but the converse is not allowed. In this paper, we propose a new scheme CRTHACS, which is based on the C...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • I. J. Network Security

دوره 16  شماره 

صفحات  -

تاریخ انتشار 2014