期刊文献+

动态存取控制新方案在广播加密中的应用

New dynamic access control scheme and applications in broadcast encryption
下载PDF
导出
摘要 为了解决通信系统中的访问控制问题,设计了一种新的分级结构中的基于单向函数思想的方案,同时将此方案应用于广播加密技术中。当使用子集覆盖方法实现广播加密技术时,利用动态存取的特性,使用户能够产生出所属子集密钥。该机制还能有效地完成密钥的分发、用户添加以及用户密钥更换等功能。 To solve the access control problems in communication systems, a new scheme in a hierarchy was designed, which was based on one-way function. Subsequently, it was applied to construct a broadcast encryption scheme. When broadcast encryption is achieved using the technique of subset cover, users can easily derive subset key due to the feature of dynamic access. The scheme is very efficient, especiaUy in key distributing phase, userjoining phase and key updating phase.
出处 《计算机工程与设计》 CSCD 北大核心 2006年第2期252-254,共3页 Computer Engineering and Design
基金 国家自然科学基金项目(60373026) 山东省自然科学基金项目(Y2003G02)
关键词 存取控制 单向函数 偏序集 广播加密 access control one-way function partially ordered set broadcast encryption
  • 相关文献

参考文献12

  • 1Akl S G, Taylor P D. Cryptographic solution to a problem of access control in a hierarchy[J]. ACM Transactions on Computer System, 1983,3 (1):239-247.
  • 2Mackinnon S T, Taylor P D, Meijer H, et al.An optimal algorithm for assigning cryptographic keys to control access in a hierarchy[J]. IEEE Trans on Computers, 1985, 34(9):797-802.
  • 3Ham L, Lin H Y. A cryptographic key generation scheme for multilevel data security [J]. Computers & Security, 1990,9 (1):539-546.
  • 4Denning D E, Akl S G, Morgenstem M, et al. Views for multileverl database secrity[C]. Proc IEEE Syrup on Security and Privacy, Oakland: CA, 1986.156-172.
  • 5Diffie W, Hellman M E. New directions in cryptography [J].IEEE Transactions on Information Theory, 1976, 22(6):644-654.
  • 6Fraim, L J. Scomp: A solution to multilevel security problem[J].IEEE Transaction on Computers, 1983, 16(7):126-143.
  • 7Pohlig S, Hellman M E. An improved algorithm for computing logarithms over GF (P) and its cryptographic significance [J].IEEE Transactions on Information Theory, 1978,24(1): 106-110.
  • 8Sandhu R S. Cryptographic implementation of a tree hierarchy for access control[J].Information Processing Letter, 1988,27:95-98.
  • 9Hwang M S, Yamg W P, Chang C C. Modified Chang-Hwang-Wu access control scheme[J]. Electronics Letters, 1993, 29(24):2095-2096.
  • 10Fiat Naor M. Broadcast encryption[C]. Advances in Cryptology-CRYPTO'93, LNCS773, 1994.480-491.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部