首页> 外文会议>International Conference on Telecommunications and Signal Processing >A Secure Key Management Scheme for Hierarchical Access Control with Secret Key Validity Checking
【24h】

A Secure Key Management Scheme for Hierarchical Access Control with Secret Key Validity Checking

机译:具有密钥有效性检查的分层访问控制的安全密钥管理方案

获取原文

摘要

Providing Security and privacy for resources in hierarchical access control is one of the fundamental security services in computer science. This service is becoming very complex to manage because of the growing number of users who have different access rights. Several key management schemes for dynamic hierarchical access control were proposed to solve the problem where higher level security classes can derive secret keys of all their corresponding successors. These schemes are used to generate, distribute and renew secret keys that are needed to encrypt data resources. In this paper, we propose a secure key management model to ensure that authorized and legitimate users have access only to resources to which they are entitled to. The proposed scheme is based on Elliptic Curve Cryptography. In this scheme, users are separated into security classes, each with different authorization level. For each security class, a specific encryption key is generated and assigned so that a class with higher authorization level can derive the key of any of its successors. Through the informal security analysis, our scheme is shown to be provably secure against both external and internal attacks. The proposed scheme provides an efficient solution to execute key generation and key derivation phases, and to overcome dynamic access control problems. In addition, our scheme makes it possible for users to verify the access to resources by running the key validity checking process to consider a derived secret key as a legitimate key before being used.
机译:为分层访问控制中的资源提供安全性和隐私是计算机科学中的基本安全服务之一。由于具有不同访问权限的用户数量越来越多,因此管理越来越复杂。提出了用于动态分层访问控制的几个关键管理方案,以解决更高级别的安全类可以导出所有相应的继承人的密钥的问题。这些方案用于生成,分发和续订加密数据资源所需的密钥。在本文中,我们提出了一个安全的密钥管理模型,以确保授权和合法的用户只能访问它们有权的资源。所提出的方案基于椭圆曲线密码学基于椭圆曲线。在此方案中,用户分为安全类,每个都具有不同的授权级别。对于每个安全类,生成并分配特定的加密密钥,以便具有更高授权级别的类可以导出其任何继承者的键。通过非正式的安全分析,我们的计划被证明可以防止外部和内部攻击。该方案提供了一个有效的解决方案来执行关键生成和关键推导阶段,并克服动态访问控制问题。此外,我们的方案使用户可以通过运行密钥有效性检查过程来验证对资源的访问,以将派生密钥视为合法密钥。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号