Design of a Lattice-based Access Control Scheme

被引:1
|
作者
Chiang, Chia-Chu [1 ]
Bayrak, Coskun [1 ]
Seker, Remzi [1 ]
Topaloglu, Umit [2 ]
Demirer, Murat [1 ,3 ]
Samadi, Nasrola [1 ]
Tek, Suleyman [1 ]
Jiang, Bian [1 ]
Zhou, GuangXu [1 ]
Wang, Xiaoran [1 ]
机构
[1] Univ Arkansas, Dept Comp Sci, 2801 South Univ Ave, Little Rock, AR 72204 USA
[2] UAMS, Little Rock, AR 72205 USA
[3] Kultur Univ, Fac Sci & Letters, Comp Sci Dept, Istanbul, Turkey
关键词
Access Control; Cryptographic Keys; Cryptography; Dynamic Key Management; Hierarchical Access Control; Lattice; Rekeying; KEY MANAGEMENT SCHEMES; ASSIGNMENT SCHEME;
D O I
10.1109/ICSMC.2009.5346329
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We survey the literature for access control schemes in a user hierarchy. Some schemes have already been shown to be insecure or incorrect. Many schemes assume very restrictive subordinating relationships existing in a hierarchy where users are grouped into partially ordered relationships without taking resources into consideration. We believe that a practical access control scheme should support access control in a lattice where users and resources are both together grouped into partially ordered relationships. In this paper, we present a scheme to achieve this goal. We also study existing schemes for their efficiency and performance. Based on the results of the study, we design an efficient scheme to support dynamic key management.
引用
收藏
页码:68 / +
页数:2
相关论文
共 50 条
  • [21] Cryptanalysis of the PEREGRINE Lattice-Based Signature Scheme
    Lin, Xiuhan
    Suzuki, Moeto
    Zhang, Shiduo
    Espitau, Thomas
    Yu, Yang
    Tibouchi, Mehdi
    Abe, Masayuki
    PUBLIC-KEY CRYPTOGRAPHY, PT I, PKC 2024, 2024, 14601 : 387 - 412
  • [22] A new lattice-based authentication scheme for IoT
    Akleylek, Sedat
    Soysaldı, Meryem
    Journal of Information Security and Applications, 2022, 64
  • [23] A Lattice-Based Threshold Secret Sharing Scheme
    Khorasgani, Hamidreza Amini
    Asaad, Saba
    Eghlidos, Taraneh
    Aref, Mohammadreza
    2014 11TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2014, : 173 - 179
  • [24] The Lattice-Based Digital Signature Scheme qTESLA
    Alkim, Erdem
    Barreto, Paulo S. L. M.
    Bindel, Nina
    Kraemer, Juliane
    Longa, Patrick
    Ricardini, Jefferson E.
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2020), PT I, 2020, 12146 : 441 - 460
  • [25] A Lattice-Based Threshold Ring Signature Scheme
    Cayrel, Pierre-Louis
    Lindner, Richard
    Ruckert, Markus
    Silva, Rosemberg
    PROGRESS IN CRYPTOLOGY - LATINCRYPT 2010, 2010, 6212 : 255 - +
  • [26] A new lattice-based authentication scheme for IoT
    Akleylek, Sedat
    Soysald, Meryem
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 64
  • [27] Lattice-based online/offline signature scheme
    Xiang, Xin-Yin
    Li, Hui
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2015, 38 (03): : 117 - 120
  • [28] A lattice-based approach for updating access control policies in real-time
    Xin, Tai
    Ray, Indrakshi
    INFORMATION SYSTEMS, 2007, 32 (05) : 755 - 772
  • [29] LBACweb: A Lattice-based Access Control Model for Mobile Thin Client based on Web OSes
    Yang, Ying
    Song, Zheng
    PROCEEDINGS OF 2019 THE 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY (ICCSP 2019) WITH WORKSHOP 2019 THE 4TH INTERNATIONAL CONFERENCE ON MULTIMEDIA AND IMAGE PROCESSING (ICMIP 2019), 2019, : 103 - 109
  • [30] A Lattice-Based Certificateless Traceable Ring Signature Scheme
    Liang, Junbin
    Huang, Jianye
    Huang, Qiong
    Lan, Liantao
    Au, Man Ho Allen
    INFORMATION, 2023, 14 (03)