Abstract
As one of the most popular information safeguarding mechanisms, access control is widely deployed in information systems. However, access control approach suffers from a tough problem, i.e. system administrators must be unconditionally trusted. Cryptographic substitutes have been developed to solve the above problem. In particular, hierarchical encryption, as an alternate solution of access control in a hierarchy, has been intensively studied. In this paper, we propose a cryptographic solution for general access control based on Chinese Remainder Theorem. Our solution has two categories: data based solution and key based solution. In contrast to the most recent hierarchical encryption system: Ray, Ray and Narasimhamurthi’s system [1], our solution is more efficient, secure and flexible. Moreover, we introduce an efficient mechanism for authorization alterations. This paper ends with a set of experimental results that support our research.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Ray, I., Ray, I., Narasimhamurthi, N.: A Cryptographic Solution to Implement Access Control in a Hierarchy and More. In: Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies, pp. 65–73. ACM Press, New York (2002)
Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST Standard for Role-based Access Control. ACM Transactions on Information and System Security 4(3), 224–274 (2001)
Jajodia, S., Samarati, P., Sapino, M.L., Subrahmanian, V.S.: Flexible Support for Multiple Access Control Policies. ACM Transactions on Database Systems 26(2), 214–260 (2001)
Akl, S.G., Taylor, P.D.: Cryptographic Solution to a Multilevel Security Problem. In: Advances in Cryptology: Proceedings of Crypto 1982, pp. 237–249. Plenum Press, New York (1982)
Akl, S.G., Taylor, P.D.: Cryptographic Solution to a Problem of Access Control in a Hierarchy. ACM Transactions on Computer Systems 1(3), 239–248 (1983)
MacKinnon, S.J., Taylor, P.D., Meijer, H., Akl, S.G.: An Optimal Algorithm for Assigning Cryptographic Keys to Access Control in a Hierarchy. IEEE Transactions on Computers 34(9), 797–802 (1985)
Chick, G.C., Tavares, S.E.: Flexible Access Control with Master Keys. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 316–322. Springer, Heidelberg (1990)
Harn, L., Lin, H.Y.: A Cryptographic Key Generation Scheme for Multi-level Data Security. Computer & Security 9(6), 539–546 (1990)
Sandhu, R.S.: Cryptographic Implementation of a Tree Hierarchy for Access Control. Information Processing Letters 27(2), 95–98 (1988)
Ohta, K., Okamoto, T., Koyama, K.: Membership Authentication for Hierarchical Multigroup using the Extended Fiat-Shamir Scheme. In: Damgård, I.B. (ed.) EUROCRYPT 1990. LNCS, vol. 473, pp. 316–322. Springer, Heidelberg (1991)
Zheng, Y., Hardjono, T., Seberry, J.: New Solutions to the Problem of Access Control in a Hierarchy. Technical Report Preprint 93-2, Department of Computer Science, University of Wollongong (1993)
Yan, S.Y.: Number Theory for Computing. Springer, Heidelberg (2002)
Menezes, A.J., Oorschot, P.C.V., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)
Rivest, R.L., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-key Cryptosystems. Communications of the ACM 21(2), 120–126 (1978)
Stallings, W.: Cryptography and Network Security: Principles and Practices. Prentice-Hall, Englewood Cliffs (1999)
Chiou, G., Chen, W.: Secure Broadcasting Using the Secure Lock. IEEE Transactions on Software Engineering 15(8), 929–934 (1989)
Zou, X., Ramamurthy, B., Magliveras, S.: Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Commmunication. In: Qing, S., Okamoto, T., Zhou, J. (eds.) ICICS 2001. LNCS, vol. 2229, pp. 381–385. Springer, Heidelberg (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kong, Y., Seberry, J., Getta, J.R., Yu, P. (2005). A Cryptographic Solution for General Access Control. In: Zhou, J., Lopez, J., Deng, R.H., Bao, F. (eds) Information Security. ISC 2005. Lecture Notes in Computer Science, vol 3650. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11556992_33
Download citation
DOI: https://doi.org/10.1007/11556992_33
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-29001-8
Online ISBN: 978-3-540-31930-6
eBook Packages: Computer ScienceComputer Science (R0)