首页 | 本学科首页   官方微博 | 高级检索  
     检索      

A practical and dynamic key management scheme for a user hierarchy
作者姓名:JENG  Fuh-gwo  WANG  Chung-ming
作者单位:Institute of Computer Science National Chung Hsing University Taichung Taiwan 402 China Department of Applied Mathematics National Chiayi University Chiayi Taiwan 60004 China,Institute of Computer Science National Chung Hsing University Taichung Taiwan 402 China
摘    要:INTRODUCTIONThe access control problem in an arbitrary par-tially ordered user hierarchy is defined below. In an organization, the users and their authorized data are organized into a group of disjoint sets of security classes, and each user is assigned to a certain security class called his security clearance. Let C1, C2, …, Cn, n∈ù, be n disjoint security classes and ‘≤’ be a binary partial-order relation over the set C={C1, C2, …, Cn}. For the set (C, ≤), Cj≤Ci (i, j∈ù) …

关 键 词:用户级  密钥管理  公用密钥  矩阵乘法
收稿时间:2005-10-20
修稿时间:2005-11-21

A practical and dynamic key management scheme for a user hierarchy
JENG Fuh-gwo WANG Chung-ming.A practical and dynamic key management scheme for a user hierarchy[J].Journal of Zhejiang University Science,2006,7(3):296-301.
Authors:Fuh-gwo Jeng  Chung-ming Wang
Institution:(1) Institute of Computer Science, National Chung Hsing University, Taichung, Taiwan, 402, China;(2) Department of Applied Mathematics, National Chiayi University, Chiayi, Taiwan, 60004, China
Abstract:In this paper, we proposed a practical and dynamic key management scheme based on the Rabin public key system and a set of matrices with canonical matrix multiplication to solve the access control problem in an arbitrary partially ordered user hierarchy. The advantage is in ensuring that the security class in the higher level can derive any of its successor’s secret keys directly and efficiently and show it is dynamic while a new security class is added into or a class is removed from the hierarchy. Even the ex-member problem can be solved efficiently. Moreover, any user can freely change its own key for some security reasons.
Keywords:User hierarchy  Key management  Rabin public key  Matrix multiplication
本文献已被 CNKI 维普 万方数据 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号