Secret sharing with access structures in a hierarchy

被引:0
作者
Chang, CC [1 ]
Lin, CH [1 ]
Lee, W [1 ]
Hwang, PC [1 ]
机构
[1] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Hsinchu, Taiwan
来源
18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS | 2004年
关键词
document management; secret sharing; access structure; hierarchical access control; delegation and agreement;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a secret sharing scheme with the property of access structures in a hierarchy. We employ the concept of admission tickets to delegate the access right from ancestors to their descendants. Each participant group has an authorized access structure and each access structure has its own secret key. The presented scheme is based on general hierarchies, and may be more suitable for real applications.
引用
收藏
页码:31 / 34
页数:4
相关论文
共 10 条
  • [1] Benaloh J., 1990, P CRYPTO 88, P27
  • [2] CHARNES C, 1997, P 1 INT C ICICS 97, P81
  • [3] Cho H. H., 2001, 2 WORKSH INF SEC APP, P357
  • [4] NEW DIRECTIONS IN CRYPTOGRAPHY
    DIFFIE, W
    HELLMAN, ME
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) : 644 - 654
  • [5] Security management architecture for access control to network resources
    Kumar, GP
    Venkataram, P
    [J]. IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1997, 144 (06): : 362 - 370
  • [6] LIN CH, 1997, COMPUT COMMUN, P1381
  • [7] LIN HY, 1991, P ASIACRYPTO 91 SPRI, P149
  • [8] IMPROVED ALGORITHM FOR COMPUTING LOGARITHMS OVER GF(P) AND ITS CRYPTOGRAPHIC SIGNIFICANCE
    POHLIG, SC
    HELLMAN, ME
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1978, 24 (01) : 106 - 110
  • [9] SCHNEIER B, 1994, APPL CRYPTOGRAPHY PR, P59
  • [10] Stinson D. R., 1992, Designs, Codes and Cryptography, V2, P357, DOI 10.1007/BF00125203