A DYNAMIC CRYPTOGRAPHIC KEY GENERATION AND INFORMATION BROADCASTING SCHEME IN INFORMATION-SYSTEMS

被引:3
作者
LIAW, HT
机构
[1] Department of Information Management, The World College of Journalism and Communications, Taipei
关键词
CRYPTOGRAPHIC KEY; HIERARCHY; RSA PUBLIC KEY; ACCESS CONTROL; BROADCASTING;
D O I
10.1016/0167-4048(94)90011-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, dynamic cryptographic key assignment and information broadcasting schemes based on the RSA public key strategy are proposed. With the cryptographic key generation in a hierarchy, all users are classified into disjoint sets of security classes which employ the relation of partial ordering. In comparison with the existing assignment schemes, whenever a new security class is appended into the user hierarchy system, the corresponding keys can be determined without changing any existing keys. On the other hand, with information broadcasting, the sender broadcasts an encrypted message onto the networking system so that only the legitimate recipients can decrypt it. Compared with the existing broadcasting schemes, our scheme always requires fewer broadcast messages. Furthermore, when a new user is inserted into the distributed system, the corresponding secret and public keys can be determined without changing any existing keys. Therefore, our scheme is suitable for practical implementation.
引用
收藏
页码:601 / 610
页数:10
相关论文
共 25 条
[1]   CRYPTOGRAPHIC SOLUTION TO A PROBLEM OF ACCESS-CONTROL IN A HIERARCHY [J].
AKL, SG ;
TAYLOR, PD .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1983, 1 (03) :239-248
[2]  
Blakely G. R., 1979, Computers & Mathematics with Applications, V5, P169, DOI 10.1016/0898-1221(79)90039-7
[3]  
BLAKLEY B, 1978, CRYPTOLOGIA, V2, P305
[4]  
BLAKLEY B, 1979, CRYPTOLOGIA, V3, P29
[5]  
BLAKLEY B, 1979, CRYPTOLOGIA, V3, P105
[6]   AN INFORMATION PROTECTION SCHEME BASED UPON NUMBER-THEORY [J].
CHANG, CC .
COMPUTER JOURNAL, 1987, 30 (03) :249-253
[7]   ON THE DESIGN OF A KEY-LOCK-PAIR MECHANISM IN INFORMATION PROTECTION SYSTEMS [J].
CHANG, CC .
BIT, 1986, 26 (04) :410-417
[8]  
CHANG CC, 1991, COMPUT SYST SCI ENG, V6, P185
[9]  
CHANG CC, 1987, OCT P INT C COMP SOF, P412
[10]   SECURE BROADCASTING USING THE SECURE LOCK [J].
CHIOU, GH ;
CHEN, WT .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1989, 15 (08) :929-930