A Cryptographic Key Generation Scheme Without A Trusted Third Party For Access Control In A Hierarchy
نویسندگان
چکیده
In this paper, we propose a new dynamic cryptographic key generation scheme for access control in a hierarchy with frequently inserted and deleted security classes. Our scheme, based on the Chinese remainder theorem and an available symmetric cryptosystem, can achieve the following four goals: First, a so-called trusted third party for generating keys is not needed in the system. Second, each security class can decide and choose a secret key independently of the other classes. Third, when a security class is inserted to or deleted from the hierarchy, we recompute only the derivation key of its immediate ancestor, without affecting the keys of the other classes in the hierarchy. Fourth, the storage space needed for the public information of each class can be as far as possible reduced.
منابع مشابه
A Dynamic Key Generation Scheme for Access Control in a Hierarchy
In this paper, we propose a new dynamic cryptographic key generation scheme for access control in a hierarchy. Our method can achieve the following three goals. First, the storage space needed to store public information is smaller than that required in the previous work. Second, when a security class is added to the hierarchy, we assign a secret key and a public derivation key to the security ...
متن کاملAn Approach to Identity Management in Clouds without Trusted Third Parties
The management of sensitive data, including identity management (IDM), is an important problem in cloud computing, fundamental for authentication and fine-grained service access control. Our goal is creating an efficient and robust IDM solution that addresses critical issues in cloud computing. The proposed IDM scheme does not rely on trusted third parties (TTPs) or trusted dealers. The scheme ...
متن کاملAn Improvement of Novel Cryptographic Key Assignment Scheme for Dynamic Access Control in a Hierarchy
This letter presents a cryptographic key assignment scheme for dynamic access control in a hierarchy. A scheme for extending a previous cryptographic key assignment scheme to reduce the computation required for key generation and derivation algorithms is also proposed.
متن کاملSecurity and Privacy for Storage and Computation in Cloud Computing
The Secure Data Sharing in Clouds (SeDaSC) methodology that provides:data confidentiality and integrity, access control, data sharing (forwarding) without using compute-intensive re-encryption, insider threat security, and forward and backward access control. The SeDaSC methodology encrypts a file with a single encryption key. Two different key shares for each of the users are generated, with t...
متن کاملSecure On-line Key Generation for MANETs by Fragment Assembly
Traditional key-management requires either the use of public key cryptography or that an on-line trusted third party arbitrate the selection and distribution of symmetric keys to communicating nodes. Recently much work has been published on random key predistribution methods, in which keys are predistributed between a limited set of node pairs and are used to bootstrap other required node pairs...
متن کامل