Abstract | ||
---|---|---|
Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the keys stored by authorized users. This approach poses the problem of the distribution of secret keys. In this paper, a key management scheme is presented where each user stores a single key and is capable of efficiently calculating appropriate keys needed to access requested data. The proposed scheme does not require encryption of the same data (key) multiple times with the keys of different users or groups of users. It is designed especially for the purpose of access control. Thanks to that, the space needed for storing public parameters is significantly reduced. Furthermore, the proposed method supports flexible updates when user's access rights change. |
Year | DOI | Venue |
---|---|---|
2008 | 10.1016/j.csi.2008.03.009 | Computer Standards & Interfaces |
Keywords | Field | DocType |
access control,authorized user,appropriate key,different user,efficient key management,secret key,key management scheme,access control mechanism,single key,access rights change,key generation,key management | Key management,Key space,Key distribution,Key generation,Computer access control,Computer science,Cryptography,Computer security,Computer network,Encryption,Access control | Journal |
Volume | Issue | ISSN |
30 | 6 | 0920-5489 |
Citations | PageRank | References |
8 | 0.56 | 13 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Anna Zych | 1 | 8 | 0.89 |
Milan Petković | 2 | 74 | 4.50 |
Willem Jonker | 3 | 640 | 55.71 |