๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy

โœ Scribed by Chien-Lung Hsu; Tzong-Sun Wu


Publisher
Elsevier Science
Year
2003
Tongue
English
Weight
152 KB
Volume
22
Category
Article
ISSN
0167-4048

No coin nor oath required. For personal study only.

โœฆ Synopsis


Recently, Wu and Chang and Shen and Chen separately proposed a cryptographic key assignment scheme for solving access control problem in a partially ordered user hierarchy. However, this paper will show the security leaks inherent in both schemes based on polynomial interpolations. That is, the users can have access to the information items held by others without following the predefined partially ordered relation. Finally, we proposed two improvements to eliminate such security flaws.

In this section, we will brief review the Wu-Chang scheme [1] and the Shen-Chen scheme [2], respectively. Both schemes are divided into the key generation and the key derivation stages as described below.

The Wu-Chang scheme

Let C = {C 1 , C 2 , โ€ฆ, C n } be a set of n security classes in the hierarchy and the notation "โ‰ค" denote a binary partially ordered relation on C.

Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy


๐Ÿ“œ SIMILAR VOLUMES


A cryptographic key assignment scheme in
โœ Hwang Min-Shiang ๐Ÿ“‚ Article ๐Ÿ“… 1997 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 416 KB

Access control is one of the mechanisms for data protection in a computer system. Many literaturee besed on cryptography have been proposed to solve the problem of access control in hierarchic structurea. Recently, Liaw and Lei proposed an optimal heuristic algorithm for multilevel data security. Bu