Design of a Lattice-based Access Control Scheme

被引:1
|
作者
Chiang, Chia-Chu [1 ]
Bayrak, Coskun [1 ]
Seker, Remzi [1 ]
Topaloglu, Umit [2 ]
Demirer, Murat [1 ,3 ]
Samadi, Nasrola [1 ]
Tek, Suleyman [1 ]
Jiang, Bian [1 ]
Zhou, GuangXu [1 ]
Wang, Xiaoran [1 ]
机构
[1] Univ Arkansas, Dept Comp Sci, 2801 South Univ Ave, Little Rock, AR 72204 USA
[2] UAMS, Little Rock, AR 72205 USA
[3] Kultur Univ, Fac Sci & Letters, Comp Sci Dept, Istanbul, Turkey
关键词
Access Control; Cryptographic Keys; Cryptography; Dynamic Key Management; Hierarchical Access Control; Lattice; Rekeying; KEY MANAGEMENT SCHEMES; ASSIGNMENT SCHEME;
D O I
10.1109/ICSMC.2009.5346329
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We survey the literature for access control schemes in a user hierarchy. Some schemes have already been shown to be insecure or incorrect. Many schemes assume very restrictive subordinating relationships existing in a hierarchy where users are grouped into partially ordered relationships without taking resources into consideration. We believe that a practical access control scheme should support access control in a lattice where users and resources are both together grouped into partially ordered relationships. In this paper, we present a scheme to achieve this goal. We also study existing schemes for their efficiency and performance. Based on the results of the study, we design an efficient scheme to support dynamic key management.
引用
收藏
页码:68 / +
页数:2
相关论文
共 50 条
  • [41] A lattice-based signcryption scheme without random oracles
    Xiuhua Lu
    Qiaoyan Wen
    Zhengping Jin
    Licheng Wang
    Chunli Yang
    Frontiers of Computer Science, 2014, 8 : 667 - 675
  • [42] An Efficient Lattice-Based Multisignature Scheme with Applications to Bitcoins
    El Bansarkhani, Rachid
    Sturm, Jan
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2016, 2016, 10052 : 140 - 155
  • [43] Improvement and Efficient Implementation of a Lattice-Based Signature Scheme
    El Bansarkhani, Rachid
    Buchmann, Johannes
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2013, 2014, 8282 : 48 - 67
  • [44] Lattice-based Dynamical and Anonymous Broadcast Encryption Scheme
    Wang Fenghe
    Wang Xuan
    Wang Chunxiao
    2015 10TH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2015, : 853 - 858
  • [45] Improved lattice-based multistage secret sharing scheme
    Kumar, Ramakant
    Padhye, Sahadeo
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2025, 50 (02):
  • [46] Role hierarchies and constraints for lattice-based access controls
    Sandhu, R.
    Lecture Notes in Computer Science, 1146
  • [47] LARA: A Design Concept for Lattice-Based Encryption
    El Bansarkhani, Rachid
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2019, 2019, 11598 : 377 - 395
  • [48] Lattice-Based Information Flow Control-by-Construction for Security-by-Design
    Runge, Tobias
    Knueppel, Alexander
    Thuem, Thomas
    Schaefer, Ina
    2020 IEEE/ACM 8TH INTERNATIONAL CONFERENCE ON FORMAL METHODS IN SOFTWARE ENGINEERING, FORMALISE, 2020, : 44 - 54
  • [49] Masking the GLP Lattice-Based Signature Scheme at Any Order
    Barthe, Gilles
    Belaid, Sonia
    Espitau, Thomas
    Fouque, Pierre-Alain
    Gregoire, Benjamin
    Rossi, Melissa
    Tibouchi, Mehdi
    JOURNAL OF CRYPTOLOGY, 2024, 37 (01)
  • [50] Lattice-Based Secret Sharing Scheme (Chinese Remainder Theorem)
    Dong, Songshou
    Yao, Yanqing
    Zhou, Yihua
    Yang, Yuguang
    DIGITAL FORENSICS AND CYBER CRIME, PT 2, ICDF2C 2023, 2024, 571 : 54 - 62