CLC number: TP391
On-line Access: 2024-08-27
Received: 2023-10-17
Revision Accepted: 2024-05-08
Crosschecked: 0000-00-00
Cited: 1
Clicked: 5954
Jeng Fuh-gwo, Wang Chung-ming. A practical and dynamic key management scheme for a user hierarchy[J]. Journal of Zhejiang University Science A, 2006, 7(3): 296-301.
@article{title="A practical and dynamic key management scheme for a user hierarchy",
author="Jeng Fuh-gwo, Wang Chung-ming",
journal="Journal of Zhejiang University Science A",
volume="7",
number="3",
pages="296-301",
year="2006",
publisher="Zhejiang University Press & Springer",
doi="10.1631/jzus.2006.A0296"
}
%0 Journal Article
%T A practical and dynamic key management scheme for a user hierarchy
%A Jeng Fuh-gwo
%A Wang Chung-ming
%J Journal of Zhejiang University SCIENCE A
%V 7
%N 3
%P 296-301
%@ 1673-565X
%D 2006
%I Zhejiang University Press & Springer
%DOI 10.1631/jzus.2006.A0296
TY - JOUR
T1 - A practical and dynamic key management scheme for a user hierarchy
A1 - Jeng Fuh-gwo
A1 - Wang Chung-ming
J0 - Journal of Zhejiang University Science A
VL - 7
IS - 3
SP - 296
EP - 301
%@ 1673-565X
Y1 - 2006
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/jzus.2006.A0296
Abstract: In this paper, we propose a practical and dynamic key management scheme based on the rabin public key system and a set of matrices with canonical matrix multiplication to solve the access control problem in an arbitrary partially ordered user hierarchy. The advantage is in ensuring that the security class in the higher level can derive any of its successor’s secret keys directly and efficiently and show it is dynamic while a new security class is added into or a class is removed from the hierarchy. Even the ex-member problem can be solved efficiently. Moreover, any user can freely change its own key for some security reasons.
[1] Akl, S.G., Taylor, P.D., 1983. Cryptographic solution to a problem of access control in a hierarchy. ACM Trans. on Computer System, 1(3):239-247.
[2] Chang, C.C., Buehrer, D.J., 1993. Access control in a hierarchy using a one-way trapdoor function. Computers and Mathematics with Applications, 26(5):71-76.
[3] Chang, C.C., Hwang, R.J., Wu, T.C., 1992. Cryptographic key assignment scheme for access control in a hierarchy. Information Systems, 17(3):243-247.
[4] Harn, L., Lin, H.Y., 1990. A cryptographic key generation scheme for multilevel data security. Computers & Security, 9(6):539-546.
[5] MacKinnon, S.T., Taylor, P.D., Meijer, H., Akl, S.G., 1985. An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Trans. Computers, C-34(9):797-802.
[6] Rabin, M.O., 1979. Digitalized Signatures and Public-key Functions as Intractable as Factorization. Technical Report, MIT/LCS/TR-212.
[7] Tsai, H.M., Chang, C.C., 1995. A cryptographic implementation for dynamic access control in a user hierarchy. Computers & Security, 14:159-166.
[8] Zheng, Y., Hardjono, T., Seberry, J., 1993. New Solutions to the Problem of Access Control in a Hierarchy. Technical Report Preprint No.93-2, Department of Computer Science, University of Wollongong, Australia.
[9] Zhong, S., 2002. A practical key management scheme for access control in a user hierarchy. Computers & Security, 21(8):750-759.
Open peer comments: Debate/Discuss/Question/Opinion
<1>