Based on both the Rabin's scheme and the Chinese remainder theorem, this paper presents a secure accesscontrol scheme for the hierarchy structure. Compared to the existing access control schemes, the scheme's ...Based on both the Rabin's scheme and the Chinese remainder theorem, this paper presents a secure accesscontrol scheme for the hierarchy structure. Compared to the existing access control schemes, the scheme's key gener-ation algorithm and derivation algorithm of successor's keys are simple. In the scheme, the predecessor not only canefficiently derive secret keys of its successors, but also can withstand the attack of collusion. The scheme's dynamicfeature is perfect. Moreover, each security class in hierarchy structure can freely select/change his own key withoutaltering other keys present in the system.展开更多
文摘Based on both the Rabin's scheme and the Chinese remainder theorem, this paper presents a secure accesscontrol scheme for the hierarchy structure. Compared to the existing access control schemes, the scheme's key gener-ation algorithm and derivation algorithm of successor's keys are simple. In the scheme, the predecessor not only canefficiently derive secret keys of its successors, but also can withstand the attack of collusion. The scheme's dynamicfeature is perfect. Moreover, each security class in hierarchy structure can freely select/change his own key withoutaltering other keys present in the system.