期刊文献+

一种针对层次结构的安全动态存取控制方案 被引量:1

A Secure Dynamic Access Control Scheme for the Hierarchy Structure
下载PDF
导出
摘要 Based on both the Rabin's scheme and the Chinese remainder theorem, this paper presents a secure accesscontrol scheme for the hierarchy structure. Compared to the existing access control schemes, the scheme's key gener-ation algorithm and derivation algorithm of successor's keys are simple. In the scheme, the predecessor not only canefficiently derive secret keys of its successors, but also can withstand the attack of collusion. The scheme's dynamicfeature is perfect. Moreover, each security class in hierarchy structure can freely select/change his own key withoutaltering other keys present in the system. Based on both the Rabin's scheme and the Chinese remainder tneorem, trus paper piesentm a (?)(?) control scheme for the hierarchy structure. Compared to the existing access control schemes, the scheme's key generation algorithm and derivation algorithm of successor's keys are simple. In the scheme, the predecessor not only can efficiently derive secret keys of its successors, but also can withstand the attack of collusion. The scheme's dynamic feature is perfect. Moreover, each security class in hierarchy structure can freely select/change his own key without altering other keys present in the system.
作者 施荣华
出处 《计算机科学》 CSCD 北大核心 2002年第12期77-79,共3页 Computer Science
基金 国家自然科学基金(批准号:60173041) 铁道信息科学与工程开放实验室项目(批准号:TDXX0205)
关键词 层次结构 安全动态存取控制 信息安全 数据安全 信息加密 计算机安全 Hierarchy structure,Rabin's scheme,Chinese remainder theorem, Dynamic access control,Key derivation algorithm
  • 相关文献

参考文献14

  • 1San J K.Asingle-key access control scheme information protec tion system.Information Science, 1990, 51 (1) : 1~11
  • 2Ham L,Lin H Y.A cryptographic key generation scheme for multilevel data security.Computer & Security, 1990, 9(3):539~546
  • 3Akl S G,Taylor P D.Cryptographic solution to a problem of access control in a hierarchy.ACM Trans.Comput.syst., 1983,1(3):239~247
  • 4Mackinnon S T,Taylor P D,Meijer H,Akl S G.An optimal algorithm for assigning cryptographic keys to control access in a hierarchy.IEEE.Trans.comput, 1985, C-35 (9): 797~802
  • 5Sandhu R S.Cryptographic implementation of a tree hierarchy for access control.Inf.proc.lett., 1988, 27:95~98
  • 6Chang C C,Hwang R K,Wu T C.Cryptographic key assignment scheme for access control in a hierarchy.Inf.Syst.,1992,17(3):243~247
  • 7Chang C C,Buehrer D J.Access Control in a hierarchy using a one-way trapdoor function.Comput.Math.with Appl., 1993, 26(5):71~76
  • 8Tsai H M,Chang C C.A Cryptographic implementation for dynamic access control in a user hierarchy.Comput.Secur., 1995,14(2) :857~959
  • 9Wu T C,Wu T S,He W H.Dynamic access control scheme based on the Chinese remainder theorem.Comput.Syst.Sci.Eng.,1995,10(2):92~99
  • 10施荣华.一种有效的动态密钥对分配方案[J].小型微型计算机系统,1997,18(12):55-58. 被引量:3

二级参考文献13

  • 1祁明,肖国镇.基于Harn签名方案的远距离通行字认证方案[J].通信学报,1996,17(1):114-119. 被引量:27
  • 2施荣华.一种基于单向函数的双重认证存取控制方案[J].电子科学学刊,1997,19(2):278-281. 被引量:23
  • 3施荣华,电子科学学刊,1997年,19卷,2期
  • 4施荣华,长沙铁道学院学报,1994年,12卷,增刊
  • 5Wu M L,IEEE Trans SE,1984年,10卷,2期,185页
  • 6Shi Ronghua,J Comput Sci Technol,1996年,11卷,4期,416页
  • 7Jan J K,Inform Sci,1990年,51卷,1期,1页
  • 8Laih C S,IEEE Trans Software Engineering,1989年,15卷,5期,1135页
  • 9Chang C C,Computer J,1987年,30卷,3期,249页
  • 10Chang C C,BIT,1986年,26卷,4期,249页

共引文献14

同被引文献7

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部