Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

On the design of a Key-Lock-Pair mechanism in information protection systems

  • Part I Computer Science
  • Published:
BIT Numerical Mathematics Aims and scope Submit manuscript

Abstract

We propose a new Key-Lock-Pair (KLP for short) mechanism based upon the Chinese Remainder Theorem that implements a single-key-lock system.

Our method is inspired by Wu and Hwang's method. Using our method, the representations of keys and locks are shorter and simpler. Moreover, faster operations and easier constructions of keys and locks are also achieved.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. R. W. Conway, W. L. Maxwell and H. L. Morgan,On the implementation of security measures in information systems, Comm. ACM, Vol. 15, No. 4, (1972), pp. 211–220.

    Google Scholar 

  2. P. J. Denning,An Undergraduate Course on Operating Systems Principles, inReport of the Cosine Comm of the Commission on Education, National Academy of Engineering, Washington, D.C. (1971).

    Google Scholar 

  3. P. J. Denning,Third generation computer systems, Computing Surveys, Vol. 3, No. 4, (1971), pp. 175–216.

    Google Scholar 

  4. G. S. Graham and P. L. Denning,Protection — principles and practice, Proc. Spring Jt. Computer Conference, Vol. 40, AFIPS Press, Montvale, N.J., (1972), pp. 417–429.

    Google Scholar 

  5. D. E. Knuth,The Art of Computer Programming, Vol. 1: Fundamental Algorithms, Second edition, Addison-Wesley, Reading, Massachusetts, (1973).

    Google Scholar 

  6. D. E. Knuth,The Art of Computer Programming, Vol. 2: Seminumerical Algorithms, Second Edition, Addison-Wesley, Reading, Massachusetts, (1980).

    Google Scholar 

  7. B. W. Lampson,Protection, Proc. 5th Princeton Symp. of Info. Sci. and Syst., Princeton Univ., (1971), pp. 437–443.

  8. M. L. Wu and T. Y. Hwang,Access control with single-key-lock, IEEE Trans. on Software Engineering, Vol. SE-10, No. 2, (1984), pp. 185–191.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Additional information

This research was supported in part by the National Science Council, Republic of China, under contract NSC75-0408-E005-01.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Chang, C.C. On the design of a Key-Lock-Pair mechanism in information protection systems. BIT 26, 410–417 (1986). https://doi.org/10.1007/BF01935048

Download citation

  • Received:

  • Revised:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF01935048

C.R. Categories