期刊文献+

基于Diffie-Hellman算法的分层密钥分配方案 被引量:14

A Hierarchical Key Assignment Scheme Based on Diffie-Hellman Algorithm
下载PDF
导出
摘要 在基于内容的访问控制系统中,主体对客体只有允许访问和拒绝访问两种权限,且主体之间和客体之间都存在一种偏序关系,传统的访问控制策略需要对主客体单独进行管理,效率较低.本文利用其中的偏序关系设计一种分层密钥分配方案,使分配的密钥既能实现保密通信又能达到实施访问控制的目的,提高系统效率.该方案利用客体之间的偏序关系使所有客体形成一个有向无环图,以多方Diffie-Hellman算法为基础为图中每个节点分配密钥,使得每个节点都可以通过自己的密钥计算出其子节点的密钥,每个节点的密钥用于加密对应于该节点的资源,从而通过对密钥的分配实现对访问权限的管理.该方案分为系统建立、密钥更新、节点加入和节点删除等部分,其安全性基于DDH假设,支持成员以及分层拓扑结构的动态变化,可用于解决基于内容的分层访问控制问题. In content-based access control systems,the subject is only allowed or denied to access the object.There are partial orders between different subjects and objects.The traditional access control policy manages these subjects and objects independently,and does not consider the partial orders which may improve the efficiency.By considering the partial orders,a hierarchical key assignment scheme is proposed in this paper,so as to make the assignment of keys to achieve secure communication and access control,improving the efficiency.The objects can be formed into a Directed Acyclic Graph(DAG) using the partial orders between these objects.Then,assign each vertex in the DAG an encryption key based on Diffie-Hellman algorithm,while each vertex may derive the encryption keys of its child vertices by the encryption key of itself.These assigned keys are used to encrypt the resources of the vertices.Thus,the access control of the resources can be achieved by the assignment of the encryption keys.The proposed scheme consists of the phases of system initialization and key updating,and supports user dynamics and topology changes.The security is based on DDH assumptions.It can be used for content-based hierarchical access control.
出处 《电子学报》 EI CAS CSCD 北大核心 2011年第1期119-123,共5页 Acta Electronica Sinica
基金 国家863高技术研究发展计划(No.2007AA01Z429,No.2007AA01Z472,No.2007AA01Z482,No.2009AA012420) 国家自然科学基金(No.60633020,No.6087204) 教育部重点项目(No.209156) 北京市自然科学基金(No.4102056) 北京电子科技学院信息安全重点实验室基金(No.YZDJ0807)
关键词 分层密钥分配 DH算法 分层访问控制 群组密钥管理 hierarchical key assignment DH algorithm hierarchical access control group key management
  • 相关文献

参考文献16

  • 1S G Akl, P D Taylor. Cryptographic solution to a problem of access control in a hierarchy[J].ACM Transaction on Computer System, 1983,1(3) :239 - 248.
  • 2J Crampton, et al. On key assignment for hierarchical access control[ A ]. In Proceedings of the 19th IEEE workshop on Computer Security Foundations (CSFW' 06) [C]. Washington, DC, USA: IEEE Computer Society,2006.98 - 111.
  • 3Q Zhang, Y Wang. A centralized key management scheme for hierarchical access control[ A]. In Proceedings of IEEE Global Telecommunications Conference (GLOBECOM' 04 ) Vol. 4 [ C]. Dallas TX, 2004.2067 - 2071.
  • 4卿斯汉,蒙杨,刘克龙.分布式应用中的多级安全密钥管理[J].电子学报,2001,29(2):369-371. 被引量:9
  • 5H R Hassen, A BouabdaUah, H Bettahar, et al. Key management for content access control in a hierarchy [ J ]. Computer Networks , 2037 , 51 (11) :3197 - 3219.
  • 6J C Birget, X Zou, G Noubir. Hierarchy-based access control in distributed environments[ A]. In IEEE International Conference on Communications ( ICC ' 01 ) Vol. 1[ C]. 2001. 229 - 233.
  • 7J Z Yan,J F Ma, H Y Liu. Key Hierarchies for Hierarchical Access Control in Secure Group Communications[J]. Computer Networks,2009,53(3) :353 - 364.
  • 8LI Fenghua,YAN Junzhi,MA Jianfeng,WANG Wei.Leveled Group Key Management with Efficient Revocations for Wireless Sensor Networks[J].Chinese Journal of Electronics,2009,18(3):494-499. 被引量:2
  • 9B Davey,H Priestley. Introduction to Lattices and Order[M]. Cambridge University Press, 1990.
  • 10F Harary. Graph Theory[M]. Reading, MA: Addison-Wesley, 1994.

二级参考文献8

  • 1[1]L.harn,H.Y.Lin.A cryptographic keys generation scheme for multilevel data security [J].Computer security,1990,9:539-546.
  • 2[2]Vincent Nicomette and Yves deswarte.A multilevel security model for distributed object systems [J].Proceedings in Computer Security,Esorics 96.
  • 3[3]R.s.sandhu and P.samarati,Access control:principles and practies [J].IEEE communications,1994,32(9):40-48.
  • 4[4]Takayuki Tachikawa,Hiroaki Higaki,Makoto Takizawa.Purpose-oriented access control model in object-based systems [A].In Proceedings ACISP′97 [C],1997,7:38-49.
  • 5[5]G.Horng.A key management approach for access control in user hierarchies [J].Proc.Of International Computer symposium,Hsinchu,TaiWan,1994:439-444.
  • 6[6]H.M.Tsai,C.C.Chang.A cryptogaryphic implementation for dynamic access control in a user hierarchy [J].compute and security,1995,14:159-166.
  • 7[7]Chu-Hsing Lin.Dynamic key management schemes for access control in a hierarchy [J].Computer comminication,1997,20(15):1381-1385.
  • 8[8]D.Bell and L.Lapadula.Secure computer systems:unified exposition and multics interpretation [R].Tech.Rep.MTR-2997,MITRE Co.,1975,7.

共引文献9

同被引文献124

引证文献14

二级引证文献51

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部