会议专题

Cryptographic Role-based Security Mechanisms Based on Role-Key Hierarchy

Even though role-based access control (RBAC) can tremen dously help us minimize the complexity in administering users, it is still needed to realize the notion of roles at the resource level. In this paper, we propose a practical eryp tographic RBAC model, called role-key hierarchy model, to support various security features including signature and en cryption based on role-key hierarchy. With the help of rich algebraic structure of elliptic curve, we introduce a role based cryptosystem construction to verify the rationality and validity of our proposed model. Also, a proof-ofconcept prototype implementation and performance evaluation are discussed to demonstrate the feasibility and efficiency of our mechanisms.

Access Control Role-based Cryptosystem Role-Key Hierarchy Pairing-based Cryptosystem

Yan Zhu Gail-Joon Ahn Hongxin Hu Huaixi Wang

Institute of Computer Science and Technology, Peking University, Beijing 100871, China Key Laborator Laboratory of Security Engineering for Future Computing (SEFCOM),Arizona State University, Tempe, AZ School of Mathematical Sciences, Peking University, Beijing 100871, China

国际会议

5th International Symposium on ACM Symposium on Information,Computer and Communications Security(ACM信息、计算机和通信安全国际会议 ASIACCS 2010)

北京

英文

314-319

2010-04-13(万方平台首次上网日期,不代表论文的发表时间)