Design of a Lattice-based Access Control Scheme

被引:1
|
作者
Chiang, Chia-Chu [1 ]
Bayrak, Coskun [1 ]
Seker, Remzi [1 ]
Topaloglu, Umit [2 ]
Demirer, Murat [1 ,3 ]
Samadi, Nasrola [1 ]
Tek, Suleyman [1 ]
Jiang, Bian [1 ]
Zhou, GuangXu [1 ]
Wang, Xiaoran [1 ]
机构
[1] Univ Arkansas, Dept Comp Sci, 2801 South Univ Ave, Little Rock, AR 72204 USA
[2] UAMS, Little Rock, AR 72205 USA
[3] Kultur Univ, Fac Sci & Letters, Comp Sci Dept, Istanbul, Turkey
关键词
Access Control; Cryptographic Keys; Cryptography; Dynamic Key Management; Hierarchical Access Control; Lattice; Rekeying; KEY MANAGEMENT SCHEMES; ASSIGNMENT SCHEME;
D O I
10.1109/ICSMC.2009.5346329
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We survey the literature for access control schemes in a user hierarchy. Some schemes have already been shown to be insecure or incorrect. Many schemes assume very restrictive subordinating relationships existing in a hierarchy where users are grouped into partially ordered relationships without taking resources into consideration. We believe that a practical access control scheme should support access control in a lattice where users and resources are both together grouped into partially ordered relationships. In this paper, we present a scheme to achieve this goal. We also study existing schemes for their efficiency and performance. Based on the results of the study, we design an efficient scheme to support dynamic key management.
引用
收藏
页码:68 / +
页数:2
相关论文
共 50 条
  • [31] Organization of Revocation for Lattice-based Group Signature Scheme
    Aleksandrova, E. B.
    Kuznetsova, E. A.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2015, 49 (08) : 770 - 777
  • [32] An Efficient Lattice-Based Heterogeneous Signcryption Scheme for VANETs
    Jiao, Jintao
    Guo, Lei
    Yu, Wensen
    Yang, Sheng
    Li, Shaozi
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2025, 37 (03):
  • [33] Improved Lattice-Based Threshold Ring Signature Scheme
    Bettaieb, Slim
    Schrek, Julien
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2013, 2013, 7932 : 34 - 51
  • [34] Cryptanalysis of a Lattice-based Multi-signature Scheme
    Kumar, Ramakant
    Padhye, Sahadeo
    NATIONAL ACADEMY SCIENCE LETTERS-INDIA, 2024,
  • [35] Lattice-Based Commitment Scheme for Low Communication Costs
    Miyaji, Hideaki
    Wang, Yuntao
    Miyaji, Atsuko
    IEEE ACCESS, 2024, 12 : 111400 - 111410
  • [36] A Novel Lattice-Based Threshold Ring Signature Scheme
    Akleylek, Sedat
    Soysaldi, Meryem
    2020 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2020, : 219 - 223
  • [37] Cryptanalysis of a round optimal lattice-based multisignature scheme
    Liu, Zi-Yuan
    Tseng, Yi-Fan
    Tso, Raylin
    INFORMATION PROCESSING LETTERS, 2023, 182
  • [38] Lattice-based proxy signature scheme in the standard model
    Li, M.-X. (limingxiang2008@gmail.com), 1600, Sichuan University (46):
  • [39] A lattice-based signcryption scheme without random oracles
    Lu, Xiuhua
    Wen, Qiaoyan
    Jin, Zhengping
    Wang, Licheng
    Yang, Chunli
    FRONTIERS OF COMPUTER SCIENCE, 2014, 8 (04) : 667 - 675
  • [40] A secure lattice-based anonymous authentication scheme for VANETs
    Liu, Hui
    Sun, Yining
    Xu, Yan
    Xu, Rui
    Wei, Zhuo
    JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2019, 42 (01) : 66 - 73