期刊文献+

分层系统中实现访问控制的动态密钥管理方案

New Dynamic Key Management Schemes for Access Control in a Hierarchy
下载PDF
导出
摘要 分层结构广泛地应用于军队、政府部门和商贸企业等许多团体机构的管理,访问控制也是信息系统安全中的一个重要问题。1997年,Lin提出了分层系统中实现访问控制的动态密钥管理方案,该方案具有许多优良的性能。随后,Lee和Hwang证明Lin方案具有两个致命的弱点:从泄露的旧组密钥很容易得到修改的新组密钥;当两个用户等级类的身份标识中不同的位很少时,低等级类中没有授权的用户容易获取高等级类的组密钥。为此,该文提出了一种等级系统中实现访问控制的动态密钥管理新方案。同现有的方案相比,新方案的安全性是基于离散对数问题的,该方案不仅克服了Lin方案的两个缺陷,而且还保持了原方案的优良特性。 Hierarchical structure of users exists in many organizations,such as military and government departments or business corporations.Access control has been an important security issue in information systems.In1997,Lin proposed dynamic key management schemes with many advantages for access control in a hierarchy.Then,Lee and Hwang show that Lin's schemes have two weaknesses:The newly chosen group key can be easily derived with the exposed old group key.Beside,if the identity of a class is different from those of the other classes by just a few bits,a user in first class can easily derive the group keys of these classes to which he /she is not entitled.This paper proposes an improvement of Lin's scheme ,whose security is based on the discrete logarithm problem.The scheme not only resists the Lee and Hwang's attacks,but also keeps the excellence of Lin's schemes.
出处 《计算机工程与应用》 CSCD 北大核心 2004年第15期23-25,共3页 Computer Engineering and Applications
基金 国家自然科学基金(编号:60173038 69873020) 广东省自然科学基金(编号:010421 000759 980690) 暨南大学211工程
关键词 离散对数问题 访问控制 用户分层系统 偏序集 discrete logarithm problem,access control,user hierarchy,partially ordered set
  • 相关文献

参考文献6

  • 1L Shen,Tzer-Shyong Chen,Feipei Lai.Novel cryptographic key assignment scheme for dynamic access control in a hierarchy[J].IEICE Trans Fundamentals, 1997; E80-A: 2035~2037
  • 2Chu-Hsing Lin. Dynamic key management schemes for access control in a hierarchy[J].Computer Communications, 1997; 20:1381~1385
  • 3Narn-Yih Lee,Tzonelih Hwang. Comments on 'Dynamic key manage ment schemes for access control in a hierarchy'[J].Computer Communications, 1999 ;22: 87~89
  • 4S G AkI,P D Taylor. Cryptographic solution to a problem of access control in a hieratchy[J].ACM Trans Computer System, 1983; 1 (3):239~247
  • 5R Ching-Te Wang,Chin-Chen Chang,Chu-Hsing Lin. Conference key supervison in a level-based hierarchy[J].IEICE Trans Fundamentals, 1998 ;E81-A: 2219~2227
  • 6卿斯汉,蒙杨,刘克龙.分布式应用中的多级安全密钥管理[J].电子学报,2001,29(2):369-371. 被引量:9

二级参考文献8

  • 1[1]L.harn,H.Y.Lin.A cryptographic keys generation scheme for multilevel data security [J].Computer security,1990,9:539-546.
  • 2[2]Vincent Nicomette and Yves deswarte.A multilevel security model for distributed object systems [J].Proceedings in Computer Security,Esorics 96.
  • 3[3]R.s.sandhu and P.samarati,Access control:principles and practies [J].IEEE communications,1994,32(9):40-48.
  • 4[4]Takayuki Tachikawa,Hiroaki Higaki,Makoto Takizawa.Purpose-oriented access control model in object-based systems [A].In Proceedings ACISP′97 [C],1997,7:38-49.
  • 5[5]G.Horng.A key management approach for access control in user hierarchies [J].Proc.Of International Computer symposium,Hsinchu,TaiWan,1994:439-444.
  • 6[6]H.M.Tsai,C.C.Chang.A cryptogaryphic implementation for dynamic access control in a user hierarchy [J].compute and security,1995,14:159-166.
  • 7[7]Chu-Hsing Lin.Dynamic key management schemes for access control in a hierarchy [J].Computer comminication,1997,20(15):1381-1385.
  • 8[8]D.Bell and L.Lapadula.Secure computer systems:unified exposition and multics interpretation [R].Tech.Rep.MTR-2997,MITRE Co.,1975,7.

共引文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部