Abstract
We propose a new Key-Lock-Pair (KLP for short) mechanism based upon the Chinese Remainder Theorem that implements a single-key-lock system.
Our method is inspired by Wu and Hwang's method. Using our method, the representations of keys and locks are shorter and simpler. Moreover, faster operations and easier constructions of keys and locks are also achieved.
Similar content being viewed by others
References
R. W. Conway, W. L. Maxwell and H. L. Morgan,On the implementation of security measures in information systems, Comm. ACM, Vol. 15, No. 4, (1972), pp. 211–220.
P. J. Denning,An Undergraduate Course on Operating Systems Principles, inReport of the Cosine Comm of the Commission on Education, National Academy of Engineering, Washington, D.C. (1971).
P. J. Denning,Third generation computer systems, Computing Surveys, Vol. 3, No. 4, (1971), pp. 175–216.
G. S. Graham and P. L. Denning,Protection — principles and practice, Proc. Spring Jt. Computer Conference, Vol. 40, AFIPS Press, Montvale, N.J., (1972), pp. 417–429.
D. E. Knuth,The Art of Computer Programming, Vol. 1: Fundamental Algorithms, Second edition, Addison-Wesley, Reading, Massachusetts, (1973).
D. E. Knuth,The Art of Computer Programming, Vol. 2: Seminumerical Algorithms, Second Edition, Addison-Wesley, Reading, Massachusetts, (1980).
B. W. Lampson,Protection, Proc. 5th Princeton Symp. of Info. Sci. and Syst., Princeton Univ., (1971), pp. 437–443.
M. L. Wu and T. Y. Hwang,Access control with single-key-lock, IEEE Trans. on Software Engineering, Vol. SE-10, No. 2, (1984), pp. 185–191.
Author information
Authors and Affiliations
Additional information
This research was supported in part by the National Science Council, Republic of China, under contract NSC75-0408-E005-01.