Abstract
The access control begins to be widely discussed, especially in organizations and systems with a hierarchical structure. In such a hierarchy, users and their information items divide into a number of disjointed sets of security classes, and to access files and documents depends on the user’s privilege. Now, many existing key assignment schemes for solving access control problems cannot exceptionally work because of the lack of flexibility. In this paper, the authors propose a simple key assignment scheme which can be performed in a user hierarchy and also can efficiently generate and derive security keys. Besides, due to the efficient dynamic key management, the scheme can be easily implemented in a realistic environment.
![](http://media.springernature.com/full/springer-static/image/art%3A10.1007%2Fs13369-013-0535-z/MediaObjects/13369_2013_535_Figa_HTML.gif)
Similar content being viewed by others
References
Hassan, H.R.; Bouabdallah, A.; Bettahar, H.; Challal, Y.: Hi-KD: an efficient keymanagement algorithm for hierarchical group communication. The First International Conference on Security and Privacy for Emerging Areas in Communications Networks (IEEESecureComm’05), Greece (2005)
Tzeng S.-F., Lee C.-C., Lin T.-C.: A Novel Key Management scheme for dynamic access control in a hierarchy. Int. J. Netw. Secur. (IJNS). 12(3), 178–180 (2011)
Zhang Q., Wang Y., Jue J.P.: A key management scheme for hierarchical access control in group communication. Int. J. Netw. Secur. (IJNS). 7(3), 323–334 (2008)
Akl S.G., Taylor P.D.: Cryptographic solution to a problem of access control in a hierarchy. ACM Trans Comput Syst. 1, 239–248 (1983)
Cacic B.J., Wei R.: Improving indirect key management scheme of access hierarchies. Int. J. Netw. Secur. (IJNS). 4(2), 128–137 (2007)
Giri D., Srivastava P.D.: A cryptographic key assignment scheme for access control in poset ordered hierarchies with enhanced security. Int. J. Netw. Secur. (IJNS). 7(2), 123–234 (2008)
Chen T.-S., Chung Y.-F.: Hierarchical access control based on Chinese remainder theorem and symmetric algorithm. Comput. Secur. 21(6), 565–570 (2002)
Kuo F.H., Shen V.R.L., Chen T.S., Lai F.: Cryptographic key assignment scheme for dynamic access control in a user hierarchy. IEE Proc. Comput. Digit. Tech. 146(5), 235–240 (1999)
Hwang M.-S.: An improvement of a dynamic cryptographic key assignment schemes in a tree hierarchy. Comput. Math. Appl. 37(3), 19–22 (1999)
Shen V.R.L., Chen T.-S.: A novel key management scheme based on discrete logarithms and polynomial interpolations. Comput. Secur. 21(2), 164–171 (2002)
Lin C.-H.: Dynamic key management schemes for access control in a hierarchy. Comput. Commun. 20, 1381–1385 (1997)
Lin I.-C., Hwang M.-S., Chang C.-C.: A new key assignment scheme for enforcing complicated access control policies in hierarchy. Future Generation Comput. Syst. 19(4), 457–462 (2003)
Mackinnon S.J., Taylor P.D., Meijer H., Akl S.G.: An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Trans. Comput. 34, 797–802 (1985)
Tzeng W.G.: A time-bound cryptographic key assignment scheme for access control in a hierarchy. IEEE Trans. Knowl. Data Eng. 14(1), 182–188 (2002)
Nikooghadam M., Zakerolhosseini A., Moghaddam M.E.: Efficient utilization of elliptic curve cryptosystem for hierarchical access control. J. Syst. Softw. 83, 1917–1929 (2010)
Lina Y.-L., Hsub C.-L.: Secure key management scheme for dynamic hierarchical access control based on ECC. J. Syst. Softw. 84, 679–685 (2011)
Harn L., Lin H.Y.: A cryptographic key generation scheme for multilevel data security. Comput. Secur. 9, 539–546 (1990)
Hwang M.-S.: Cryptanalysis of YCN key assignment scheme in a hierarchy. Inform. Process. Lett. 73(3), 97–101 (2000)
Sandhu R.S.: Cryptographic implementation of a tree hierarchy for access control. Inform. Process. Lett. 27, 95–98 (1988)
Chang, C.C.;Hwang, R.J.;Wu, T.C.:Acryptographic key management scheme for access control in a tree structure. In: International Computer Symposium, pp. 174–178, R.O.C. (1992)
Liaw H.-T., Lei C.-L.: An optimal algorithm to assign cryptographic keys in a tree structure for access control. BIT. 33, 46–56 (1993)
Hwang M.-S.: Extension of CHW cryptographic key assignment scheme in a hierarchy. IEE Proc. Comput. Digit. Tech. 146(4), 219 (1999)
Hwang M.-S., Chang C.-C., Yang W.-P.: Modified Chang- Hwang-Wu access control scheme. IEE Electron. Lett. 29, 2095–2096 (1993)
Hsu C.-L., Wu T.-S.: Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy. Comput. Secur. 22(5), 453–456 (2003)
Knuth, D.E.: The art of computer programming, Vol. 2 (Seminumerical Algorithm), 2nd edn. Addison-Wesley, MA (1980)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Lo, JW., Hwang, MS. & Liu, CH. A Simple Key Assignment for Access Control Based on Polynomial. Arab J Sci Eng 38, 1397–1403 (2013). https://doi.org/10.1007/s13369-013-0535-z
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s13369-013-0535-z