Distribution of cryptographic keys in systems with a hierarchy of objects

被引:6
|
作者
Belim S.V. [1 ]
Bogachenko N.F. [1 ]
机构
[1] Dostoevsky Omsk State University, Omsk
关键词
access division; cryptographic key distribution; hashing function; object hierarchy;
D O I
10.3103/S0146411616080071
中图分类号
学科分类号
摘要
An algorithm for the distribution of cryptographic keys is presented, which is based on the hierarchical structure of objects in the system. The performance of the algorithm for some types of the graph of the object hierarchy is substantiated. A mechanism for setting mandatory and discretionary access differentiation is proposed using the algorithm. © 2016, Allerton Press, Inc.
引用
收藏
页码:777 / 786
页数:9
相关论文
共 50 条
  • [1] DISTRIBUTION OF CRYPTOGRAPHIC KEYS TO ENHANCE CONVENIENCE
    MIYAGUCHI, S
    MORITA, H
    SUGITA, M
    NTT REVIEW, 1994, 6 (02): : 12 - 14
  • [2] GENERATION, DISTRIBUTION, AND INSTALLATION OF CRYPTOGRAPHIC KEYS
    MATYAS, SM
    MEYER, CH
    IBM SYSTEMS JOURNAL, 1978, 17 (02) : 126 - 137
  • [3] AN OPTIMAL ALGORITHM FOR ASSIGNING CRYPTOGRAPHIC KEYS TO CONTROL ACCESS IN A HIERARCHY
    MACKINNON, SJ
    TAYLOR, PD
    MEIJER, H
    AKL, SG
    IEEE TRANSACTIONS ON COMPUTERS, 1985, 34 (09) : 797 - 802
  • [4] DISTRIBUTED ASSIGNMENT OF CRYPTOGRAPHIC KEYS FOR ACCESS-CONTROL IN A HIERARCHY
    SHAO, BM
    HWANG, JJ
    WANG, PC
    COMPUTERS & SECURITY, 1994, 13 (01) : 79 - 84
  • [5] On the distribution and revocation of cryptographic keys in sensor networks
    Chan, HW
    Gligor, VD
    Perrig, A
    Muralidharan, G
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2005, 2 (03) : 233 - 247
  • [6] Assigning cryptographic keys to access control in a multi-attribute hierarchy
    Guan, BC
    Wang, P
    Chen, YF
    Chang, RI
    37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2003, : 337 - 340
  • [7] OPTIMAL ALGORITHM FOR ASSIGNING CRYPTOGRAPHIC KEYS TO CONTROL ACCESS IN A HIERARCHY.
    MacKinnon, Stephen J.
    Taylor, Peter D.
    Meijer, Henk
    Akl, Selim G.
    IEEE Transactions on Computers, 1985, C-34 (09) : 797 - 802
  • [8] LIFETIMES OF KEYS IN CRYPTOGRAPHIC KEY MANAGEMENT-SYSTEMS
    OKAMOTO, E
    NAKAMURA, K
    LECTURE NOTES IN COMPUTER SCIENCE, 1986, 218 : 246 - 259
  • [9] A Cryptographic Keys Transfer Protocol for Secure Communicating Systems
    Atighehchi, Kevin
    Muntean, Traian
    Parlanti, Sylvain
    Rolland, Robert
    Vallet, Laurent
    12TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING (SYNASC 2010), 2011, : 339 - 343
  • [10] On replacing cryptographic keys in hierarchical key management systems
    Kayem, Anne
    Akl, Selim
    Martin, Patrick
    JOURNAL OF COMPUTER SECURITY, 2008, 16 (03) : 289 - 309