A cryptographic key assignment scheme for access control in a hierarchy with exceptions

Research output: Contribution to journalArticle

Abstract

Hierarchy is a critical issue in the access control policy for information protection systems. There are many cryptographic key assignment schemes that were proposed to solve the access control problem in a hierarchy. But some distributed systems need more complex access control policies that can not be expressed in the hierarchy model. Recently, Yeh et al. proposed a cryptographic key assignment scheme, which enforces access control policies in a hierarchy with the transitive and the anti-symmetric exceptions. Unfortunately, in 2000, Hwang has shown that Yeh et al.’s scheme is not secure against a cooperative attack. This article presents a secure cryptographic key assignment scheme for access control policies in a hierarchy with exceptions, which can withstand the Hwang’s cooperative attack. Meanwhile, it also provides an effective and dynamic method to generate, derive and update the secret keys and the public values.

Original languageEnglish
Pages (from-to)121-132
Number of pages12
JournalJournal of Discrete Mathematical Sciences and Cryptography
Volume7
Issue number1
DOIs
Publication statusPublished - 2004 Jan 1

Fingerprint

Access Control
Access control
Exception
Control Policy
Assignment
Attack
Antisymmetric
Distributed Systems
Control Problem
Update
Hierarchy

All Science Journal Classification (ASJC) codes

  • Analysis
  • Algebra and Number Theory
  • Applied Mathematics

Cite this

@article{8b32787d724e420c80a5b334bb2cf983,
title = "A cryptographic key assignment scheme for access control in a hierarchy with exceptions",
abstract = "Hierarchy is a critical issue in the access control policy for information protection systems. There are many cryptographic key assignment schemes that were proposed to solve the access control problem in a hierarchy. But some distributed systems need more complex access control policies that can not be expressed in the hierarchy model. Recently, Yeh et al. proposed a cryptographic key assignment scheme, which enforces access control policies in a hierarchy with the transitive and the anti-symmetric exceptions. Unfortunately, in 2000, Hwang has shown that Yeh et al.’s scheme is not secure against a cooperative attack. This article presents a secure cryptographic key assignment scheme for access control policies in a hierarchy with exceptions, which can withstand the Hwang’s cooperative attack. Meanwhile, it also provides an effective and dynamic method to generate, derive and update the secret keys and the public values.",
author = "Yuh-Min Tseng",
year = "2004",
month = "1",
day = "1",
doi = "10.1080/09720529.2004.10697994",
language = "English",
volume = "7",
pages = "121--132",
journal = "Journal of Discrete Mathematical Sciences and Cryptography",
issn = "0972-0529",
publisher = "TARU Publications",
number = "1",

}

TY - JOUR

T1 - A cryptographic key assignment scheme for access control in a hierarchy with exceptions

AU - Tseng, Yuh-Min

PY - 2004/1/1

Y1 - 2004/1/1

N2 - Hierarchy is a critical issue in the access control policy for information protection systems. There are many cryptographic key assignment schemes that were proposed to solve the access control problem in a hierarchy. But some distributed systems need more complex access control policies that can not be expressed in the hierarchy model. Recently, Yeh et al. proposed a cryptographic key assignment scheme, which enforces access control policies in a hierarchy with the transitive and the anti-symmetric exceptions. Unfortunately, in 2000, Hwang has shown that Yeh et al.’s scheme is not secure against a cooperative attack. This article presents a secure cryptographic key assignment scheme for access control policies in a hierarchy with exceptions, which can withstand the Hwang’s cooperative attack. Meanwhile, it also provides an effective and dynamic method to generate, derive and update the secret keys and the public values.

AB - Hierarchy is a critical issue in the access control policy for information protection systems. There are many cryptographic key assignment schemes that were proposed to solve the access control problem in a hierarchy. But some distributed systems need more complex access control policies that can not be expressed in the hierarchy model. Recently, Yeh et al. proposed a cryptographic key assignment scheme, which enforces access control policies in a hierarchy with the transitive and the anti-symmetric exceptions. Unfortunately, in 2000, Hwang has shown that Yeh et al.’s scheme is not secure against a cooperative attack. This article presents a secure cryptographic key assignment scheme for access control policies in a hierarchy with exceptions, which can withstand the Hwang’s cooperative attack. Meanwhile, it also provides an effective and dynamic method to generate, derive and update the secret keys and the public values.

UR - http://www.scopus.com/inward/record.url?scp=85024530543&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85024530543&partnerID=8YFLogxK

U2 - 10.1080/09720529.2004.10697994

DO - 10.1080/09720529.2004.10697994

M3 - Article

AN - SCOPUS:85024530543

VL - 7

SP - 121

EP - 132

JO - Journal of Discrete Mathematical Sciences and Cryptography

JF - Journal of Discrete Mathematical Sciences and Cryptography

SN - 0972-0529

IS - 1

ER -