Cryptographic key assignment schemes for any access control policy

被引:26
作者
De Santis, A [1 ]
Ferrara, AL [1 ]
Masucci, B [1 ]
机构
[1] Univ Salerno, Dipartimento Informat & Applicaz, I-84081 Baronissi, SA, Italy
关键词
cryptography; distributed systems; safety/security in digital systems; access control; partial ordering;
D O I
10.1016/j.ipl.2004.03.019
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The access control problem deals with the management of sensitive information among a number of users who are classified according to their suitability in accessing the information in a computer system. The set of rules that specify the information flow between different user classes in the system defines an access control policy. Akl and Taylor first considered the access control problem in a system organized as a partially ordered hierarchy. They proposed a cryptographic key assignment scheme, where each class is assigned an encryption key that can be used, along with some public parameters generated by a central authority, to compute the key assigned to any class lower down in the hierarchy. Subsequently, many researchers have proposed schemes that either have better performances or allow insertion and deletion of classes in the hierarchy. In this paper we show how to construct a cryptographic key assignment scheme for any arbitrary access control policy. Our construction uses as a building block a cryptographic key assignment scheme for partially ordered hierarchies. The security of our scheme holds with respect to adversaries of limited computing power and directly derives from the security of the underlying scheme for partially ordered hierarchies. Moreover, the size of the keys assigned to classes in our scheme is exactly the same as in the underlying scheme. (C) 2004 Elsevier B.V. All rights reserved.
引用
收藏
页码:199 / 205
页数:7
相关论文
共 18 条
[1]   CRYPTOGRAPHIC SOLUTION TO A PROBLEM OF ACCESS-CONTROL IN A HIERARCHY [J].
AKL, SG ;
TAYLOR, PD .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1983, 1 (03) :239-248
[2]  
Bach E., 1996, ALGORITHMIC NUMBER T
[3]  
DESANTIS A, 2003, P INT WORKSH COD CRY
[4]  
DESANTIS A, IN PRESS DISCRETE AP
[5]  
Ferrara AL, 2003, LECT NOTES COMPUT SC, V2841, P342
[6]  
Hardy G. H., 2008, INTRO THEORY NUMBERS, Vsixth
[7]  
Harn L., 1990, Computers & Security, V9, P539, DOI 10.1016/0167-4048(90)90132-D
[8]  
Hwang MS, 1997, MATH COMPUT MODEL, V26, P27, DOI 10.1016/S0895-7177(97)00120-9
[9]   Cryptanalysis of YCN key assignment scheme in a hierarchy [J].
Hwang, MS .
INFORMATION PROCESSING LETTERS, 2000, 73 (3-4) :97-101
[10]   Controlling access in large partially ordered hierarchies using cryptographic keys [J].
Hwang, MS ;
Yang, WP .
JOURNAL OF SYSTEMS AND SOFTWARE, 2003, 67 (02) :99-107