Log in

A Simple Key Assignment for Access Control Based on Polynomial

  • Research Article - Computer Engineering and Computer Science
  • Published:
Arabian Journal for Science and Engineering Aims and scope Submit manuscript

Abstract

The access control begins to be widely discussed, especially in organizations and systems with a hierarchical structure. In such a hierarchy, users and their information items divide into a number of disjointed sets of security classes, and to access files and documents depends on the user’s privilege. Now, many existing key assignment schemes for solving access control problems cannot exceptionally work because of the lack of flexibility. In this paper, the authors propose a simple key assignment scheme which can be performed in a user hierarchy and also can efficiently generate and derive security keys. Besides, due to the efficient dynamic key management, the scheme can be easily implemented in a realistic environment.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Germany)

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Hassan, H.R.; Bouabdallah, A.; Bettahar, H.; Challal, Y.: Hi-KD: an efficient keymanagement algorithm for hierarchical group communication. The First International Conference on Security and Privacy for Emerging Areas in Communications Networks (IEEESecureComm’05), Greece (2005)

  2. Tzeng S.-F., Lee C.-C., Lin T.-C.: A Novel Key Management scheme for dynamic access control in a hierarchy. Int. J. Netw. Secur. (IJNS). 12(3), 178–180 (2011)

    Google Scholar 

  3. Zhang Q., Wang Y., Jue J.P.: A key management scheme for hierarchical access control in group communication. Int. J. Netw. Secur. (IJNS). 7(3), 323–334 (2008)

    Google Scholar 

  4. Akl S.G., Taylor P.D.: Cryptographic solution to a problem of access control in a hierarchy. ACM Trans Comput Syst. 1, 239–248 (1983)

    Article  Google Scholar 

  5. Cacic B.J., Wei R.: Improving indirect key management scheme of access hierarchies. Int. J. Netw. Secur. (IJNS). 4(2), 128–137 (2007)

    Google Scholar 

  6. Giri D., Srivastava P.D.: A cryptographic key assignment scheme for access control in poset ordered hierarchies with enhanced security. Int. J. Netw. Secur. (IJNS). 7(2), 123–234 (2008)

    Google Scholar 

  7. Chen T.-S., Chung Y.-F.: Hierarchical access control based on Chinese remainder theorem and symmetric algorithm. Comput. Secur. 21(6), 565–570 (2002)

    Article  Google Scholar 

  8. Kuo F.H., Shen V.R.L., Chen T.S., Lai F.: Cryptographic key assignment scheme for dynamic access control in a user hierarchy. IEE Proc. Comput. Digit. Tech. 146(5), 235–240 (1999)

    Article  Google Scholar 

  9. Hwang M.-S.: An improvement of a dynamic cryptographic key assignment schemes in a tree hierarchy. Comput. Math. Appl. 37(3), 19–22 (1999)

    Article  MathSciNet  Google Scholar 

  10. Shen V.R.L., Chen T.-S.: A novel key management scheme based on discrete logarithms and polynomial interpolations. Comput. Secur. 21(2), 164–171 (2002)

    Article  Google Scholar 

  11. Lin C.-H.: Dynamic key management schemes for access control in a hierarchy. Comput. Commun. 20, 1381–1385 (1997)

    Article  Google Scholar 

  12. Lin I.-C., Hwang M.-S., Chang C.-C.: A new key assignment scheme for enforcing complicated access control policies in hierarchy. Future Generation Comput. Syst. 19(4), 457–462 (2003)

    Article  Google Scholar 

  13. Mackinnon S.J., Taylor P.D., Meijer H., Akl S.G.: An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Trans. Comput. 34, 797–802 (1985)

    Article  Google Scholar 

  14. Tzeng W.G.: A time-bound cryptographic key assignment scheme for access control in a hierarchy. IEEE Trans. Knowl. Data Eng. 14(1), 182–188 (2002)

    Article  MathSciNet  Google Scholar 

  15. Nikooghadam M., Zakerolhosseini A., Moghaddam M.E.: Efficient utilization of elliptic curve cryptosystem for hierarchical access control. J. Syst. Softw. 83, 1917–1929 (2010)

    Article  Google Scholar 

  16. Lina Y.-L., Hsub C.-L.: Secure key management scheme for dynamic hierarchical access control based on ECC. J. Syst. Softw. 84, 679–685 (2011)

    Article  Google Scholar 

  17. Harn L., Lin H.Y.: A cryptographic key generation scheme for multilevel data security. Comput. Secur. 9, 539–546 (1990)

    Article  Google Scholar 

  18. Hwang M.-S.: Cryptanalysis of YCN key assignment scheme in a hierarchy. Inform. Process. Lett. 73(3), 97–101 (2000)

    Article  MathSciNet  MATH  Google Scholar 

  19. Sandhu R.S.: Cryptographic implementation of a tree hierarchy for access control. Inform. Process. Lett. 27, 95–98 (1988)

    Article  Google Scholar 

  20. Chang, C.C.;Hwang, R.J.;Wu, T.C.:Acryptographic key management scheme for access control in a tree structure. In: International Computer Symposium, pp. 174–178, R.O.C. (1992)

  21. Liaw H.-T., Lei C.-L.: An optimal algorithm to assign cryptographic keys in a tree structure for access control. BIT. 33, 46–56 (1993)

    Article  MathSciNet  MATH  Google Scholar 

  22. Hwang M.-S.: Extension of CHW cryptographic key assignment scheme in a hierarchy. IEE Proc. Comput. Digit. Tech. 146(4), 219 (1999)

    Article  Google Scholar 

  23. Hwang M.-S., Chang C.-C., Yang W.-P.: Modified Chang- Hwang-Wu access control scheme. IEE Electron. Lett. 29, 2095–2096 (1993)

    Article  Google Scholar 

  24. Hsu C.-L., Wu T.-S.: Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy. Comput. Secur. 22(5), 453–456 (2003)

    Article  Google Scholar 

  25. Knuth, D.E.: The art of computer programming, Vol. 2 (Seminumerical Algorithm), 2nd edn. Addison-Wesley, MA (1980)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Min-Shiang Hwang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Lo, JW., Hwang, MS. & Liu, CH. A Simple Key Assignment for Access Control Based on Polynomial. Arab J Sci Eng 38, 1397–1403 (2013). https://doi.org/10.1007/s13369-013-0535-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13369-013-0535-z

Keywords

Navigation