Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy
โ Scribed by Chien-Lung Hsu; Tzong-Sun Wu
- Publisher
- Elsevier Science
- Year
- 2003
- Tongue
- English
- Weight
- 152 KB
- Volume
- 22
- Category
- Article
- ISSN
- 0167-4048
No coin nor oath required. For personal study only.
โฆ Synopsis
Recently, Wu and Chang and Shen and Chen separately proposed a cryptographic key assignment scheme for solving access control problem in a partially ordered user hierarchy. However, this paper will show the security leaks inherent in both schemes based on polynomial interpolations. That is, the users can have access to the information items held by others without following the predefined partially ordered relation. Finally, we proposed two improvements to eliminate such security flaws.
In this section, we will brief review the Wu-Chang scheme [1] and the Shen-Chen scheme [2], respectively. Both schemes are divided into the key generation and the key derivation stages as described below.
The Wu-Chang scheme
Let C = {C 1 , C 2 , โฆ, C n } be a set of n security classes in the hierarchy and the notation "โค" denote a binary partially ordered relation on C.
Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy
๐ SIMILAR VOLUMES
Access control is one of the mechanisms for data protection in a computer system. Many literaturee besed on cryptography have been proposed to solve the problem of access control in hierarchic structurea. Recently, Liaw and Lei proposed an optimal heuristic algorithm for multilevel data security. Bu