Full Text:   <2601>

CLC number: TP391

On-line Access: 

Received: 2005-10-20

Revision Accepted: 2005-11-21

Crosschecked: 0000-00-00

Cited: 1

Clicked: 5507

Citations:  Bibtex RefMan EndNote GB/T7714

-   Go to

Article info.
Open peer comments

Journal of Zhejiang University SCIENCE A 2006 Vol.7 No.3 P.296-301

http://doi.org/10.1631/jzus.2006.A0296


A practical and dynamic key management scheme for a user hierarchy


Author(s):  Jeng Fuh-gwo, Wang Chung-ming

Affiliation(s):  Institute of Computer Science, National Chung Hsing University, Taichung, Taiwan 402, China; more

Corresponding email(s):   fgjeng@mail.ncyu.edu.tw, cmwang@cs.nchu.edu.tw

Key Words:  User hierarchy, Key management, Rabin public key, Matrix multiplication


Jeng Fuh-gwo, Wang Chung-ming. A practical and dynamic key management scheme for a user hierarchy[J]. Journal of Zhejiang University Science A, 2006, 7(3): 296-301.

@article{title="A practical and dynamic key management scheme for a user hierarchy",
author="Jeng Fuh-gwo, Wang Chung-ming",
journal="Journal of Zhejiang University Science A",
volume="7",
number="3",
pages="296-301",
year="2006",
publisher="Zhejiang University Press & Springer",
doi="10.1631/jzus.2006.A0296"
}

%0 Journal Article
%T A practical and dynamic key management scheme for a user hierarchy
%A Jeng Fuh-gwo
%A Wang Chung-ming
%J Journal of Zhejiang University SCIENCE A
%V 7
%N 3
%P 296-301
%@ 1673-565X
%D 2006
%I Zhejiang University Press & Springer
%DOI 10.1631/jzus.2006.A0296

TY - JOUR
T1 - A practical and dynamic key management scheme for a user hierarchy
A1 - Jeng Fuh-gwo
A1 - Wang Chung-ming
J0 - Journal of Zhejiang University Science A
VL - 7
IS - 3
SP - 296
EP - 301
%@ 1673-565X
Y1 - 2006
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/jzus.2006.A0296


Abstract: 
In this paper, we propose a practical and dynamic key management scheme based on the rabin public key system and a set of matrices with canonical matrix multiplication to solve the access control problem in an arbitrary partially ordered user hierarchy. The advantage is in ensuring that the security class in the higher level can derive any of its successor’s secret keys directly and efficiently and show it is dynamic while a new security class is added into or a class is removed from the hierarchy. Even the ex-member problem can be solved efficiently. Moreover, any user can freely change its own key for some security reasons.

Darkslateblue:Affiliate; Royal Blue:Author; Turquoise:Article

Reference

[1] Akl, S.G., Taylor, P.D., 1983. Cryptographic solution to a problem of access control in a hierarchy. ACM Trans. on Computer System, 1(3):239-247.

[2] Chang, C.C., Buehrer, D.J., 1993. Access control in a hierarchy using a one-way trapdoor function. Computers and Mathematics with Applications, 26(5):71-76.

[3] Chang, C.C., Hwang, R.J., Wu, T.C., 1992. Cryptographic key assignment scheme for access control in a hierarchy. Information Systems, 17(3):243-247.

[4] Harn, L., Lin, H.Y., 1990. A cryptographic key generation scheme for multilevel data security. Computers & Security, 9(6):539-546.

[5] MacKinnon, S.T., Taylor, P.D., Meijer, H., Akl, S.G., 1985. An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Trans. Computers, C-34(9):797-802.

[6] Rabin, M.O., 1979. Digitalized Signatures and Public-key Functions as Intractable as Factorization. Technical Report, MIT/LCS/TR-212.

[7] Tsai, H.M., Chang, C.C., 1995. A cryptographic implementation for dynamic access control in a user hierarchy. Computers & Security, 14:159-166.

[8] Zheng, Y., Hardjono, T., Seberry, J., 1993. New Solutions to the Problem of Access Control in a Hierarchy. Technical Report Preprint No.93-2, Department of Computer Science, University of Wollongong, Australia.

[9] Zhong, S., 2002. A practical key management scheme for access control in a user hierarchy. Computers & Security, 21(8):750-759.

Open peer comments: Debate/Discuss/Question/Opinion

<1>

Please provide your name, email address and a comment





Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2024 Journal of Zhejiang University-SCIENCE