DYNAMIC ACCESS-CONTROL SCHEME BASED ON THE CHINESE REMAINDER THEOREM

被引:0
|
作者
WU, TC
WU, TS
HE, WH
机构
来源
关键词
ACCESS CONTROL; USER HIERARCHY; CRYPTOGRAPHIC KEY ASSIGNMENT; CHINESE REMAINDER THEOREM;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a cryptographic key assignment scheme for solving the access control problem in a partially ordered user hierarchy. Based on the Chinese remainder theorem, each user is assigned a secret key, a deriving key, and the corresponding public parameters. Any user with higher security clearance can directly derive his successor's deriving key by using his own secret key and his successor's public parameters. Then the user Elses the deriving key to obtain his successor's encryption key. The dynamic access control problems, such as adding/deleting users, adding/deleting relationships, and changing secret/encryption keys, are considered. We also show that the proposed scheme can withstand the attack of collusion.
引用
收藏
页码:92 / 99
页数:8
相关论文
共 50 条
  • [1] An access control scheme based on Chinese remainder theorem and time stamp concept
    Hwang, MS
    Tzeng, WG
    Yang, WP
    [J]. COMPUTERS & SECURITY, 1996, 15 (01) : 73 - 81
  • [2] Efficient and Scalable Access Management Scheme Based on Chinese Remainder Theorem
    Hsiao, Tsung-Chih
    Huang, Yin-Tzu
    Huang, Yu-Min
    Chen, Tzer-Long
    Chen, Tzer-Shyong
    Wang, Sheng-De
    [J]. SENSORS AND MATERIALS, 2018, 30 (03) : 413 - 422
  • [3] Yet another attack on the chinese remainder theorem-based hierarchical access control scheme
    Liu, Niu
    Tang, Shaohua
    Xu, Lingling
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (07) : 1079 - 1095
  • [4] Hierarchical access control based on Chinese Remainder Theorem and symmetric algorithm
    Chen, TS
    Chung, YF
    [J]. COMPUTERS & SECURITY, 2002, 21 (06) : 565 - 570
  • [5] A DYNAMIC ACCESS-CONTROL SCHEME BASED UPON THE KNAPSACK-PROBLEM
    JAN, JK
    WANG, SJ
    [J]. COMPUTERS & MATHEMATICS WITH APPLICATIONS, 1993, 26 (12) : 75 - 86
  • [6] THE DESIGN OF DYNAMIC ACCESS-CONTROL SCHEME WITH USER AUTHENTICATION
    YEN, SM
    LAIH, CS
    [J]. COMPUTERS & MATHEMATICS WITH APPLICATIONS, 1993, 25 (07) : 27 - 32
  • [7] An Information Hiding Scheme Based on Chinese Remainder Theorem
    Chen, Jinrui
    Liu, Kesheng
    Yan, Xuehu
    Liu, Hanlin
    Liu, Lintao
    Tan, Longdan
    [J]. 2018 IEEE 3RD INTERNATIONAL CONFERENCE ON IMAGE, VISION AND COMPUTING (ICIVC), 2018, : 785 - 790
  • [8] A TDMA BASED ACCESS-CONTROL SCHEME FOR APONS
    ANGELOPOULOS, JD
    VENIERIS, IS
    STASSINOPOULOS, GI
    [J]. JOURNAL OF LIGHTWAVE TECHNOLOGY, 1993, 11 (5-6) : 1095 - 1103
  • [9] A NEW DYNAMIC ACCESS-CONTROL SCHEME BASED ON SUBJECT-OBJECT LIST
    HWANG, MS
    YANG, WP
    [J]. DATA & KNOWLEDGE ENGINEERING, 1994, 14 (01) : 45 - 56
  • [10] A proactive secret sharing scheme based on Chinese remainder theorem
    Meng, Keju
    Miao, Fuyou
    Ning, Yu
    Huang, Wenchao
    Xiong, Yan
    Chang, Chin-Chen
    [J]. FRONTIERS OF COMPUTER SCIENCE, 2021, 15 (02)