Cryptographic key assignment schemes for any access control policy

被引:26
作者
De Santis, A [1 ]
Ferrara, AL [1 ]
Masucci, B [1 ]
机构
[1] Univ Salerno, Dipartimento Informat & Applicaz, I-84081 Baronissi, SA, Italy
关键词
cryptography; distributed systems; safety/security in digital systems; access control; partial ordering;
D O I
10.1016/j.ipl.2004.03.019
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The access control problem deals with the management of sensitive information among a number of users who are classified according to their suitability in accessing the information in a computer system. The set of rules that specify the information flow between different user classes in the system defines an access control policy. Akl and Taylor first considered the access control problem in a system organized as a partially ordered hierarchy. They proposed a cryptographic key assignment scheme, where each class is assigned an encryption key that can be used, along with some public parameters generated by a central authority, to compute the key assigned to any class lower down in the hierarchy. Subsequently, many researchers have proposed schemes that either have better performances or allow insertion and deletion of classes in the hierarchy. In this paper we show how to construct a cryptographic key assignment scheme for any arbitrary access control policy. Our construction uses as a building block a cryptographic key assignment scheme for partially ordered hierarchies. The security of our scheme holds with respect to adversaries of limited computing power and directly derives from the security of the underlying scheme for partially ordered hierarchies. Moreover, the size of the keys assigned to classes in our scheme is exactly the same as in the underlying scheme. (C) 2004 Elsevier B.V. All rights reserved.
引用
收藏
页码:199 / 205
页数:7
相关论文
共 18 条
[11]   A DYNAMIC CRYPTOGRAPHIC KEY ASSIGNMENT SCHEME IN A TREE STRUCTURE [J].
LIAW, HT ;
WANG, SJ ;
LEI, CL .
COMPUTERS & MATHEMATICS WITH APPLICATIONS, 1993, 25 (06) :109-114
[12]   Dynamic key management schemes for access control in a hierarchy [J].
Lin, CH .
COMPUTER COMMUNICATIONS, 1997, 20 (15) :1381-1385
[13]  
MACKINNON SJ, 1985, IEEE T COMPUT, V34, P797, DOI 10.1109/TC.1985.1676635
[14]  
Rabin M.O., 1979, DIGITALIZED SIGNATUR
[15]  
RIVEST RL, 1978, COMMUN ACM, V21, P120, DOI 10.1145/357980.358017
[16]   CRYPTOGRAPHIC IMPLEMENTATION OF A TREE HIERARCHY FOR ACCESS-CONTROL [J].
SANDHU, RS .
INFORMATION PROCESSING LETTERS, 1988, 27 (02) :95-98
[17]  
Sloane N., 1995, The encyclopedia of integer sequences
[18]  
Yeh J.H., 1998, P INT S INT TECHN, P54