Flexible Access Control with Master Keys
We show how to create a master key scheme for controlling access to a set of services. Each master key is a concise representation for a list of service keys, such that only service keys in this list can be computed easily from the master key. Our scheme is more flexible than others, permitting hierarchical organization and expansion of the set of services.
KeywordsCentral Authority Hierarchical System Modular Exponentiation Rigid Hierarchy Biennial Symposium
- S. G. Akl and P. D. Taylor, Cryptographic solution to a multilevel security problem, in Advances in Cryptology-Proceedings of Crypto’ 82, Springer-Verlag, 1983, pp. 237–249.Google Scholar
- B. L. Chan and H. Meijer, A multiple trusted nodes security system, in 13th Biennial Symposium on Communications, Kingston, Canada, 1986, Queen’s University.Google Scholar
- E. D. Kamin, J. W. Greene, and M. E. Hellman, On secret sharing systems, IEEE Trans. Information Theory, IT-29 (1983), pp. 35–41.Google Scholar
- S. J. MacKinnon and S. G. Akl, New key generation algorithms for multilevel security, in IEEE Symposium on Security and Privacy, 1983, pp. 72–78.Google Scholar
- H. Meijer, Cryptology: Complexity and Applications, PhD thesis, Department of Mathematics and Statistics, Queen’s University, Kingston, Canada, 1983.Google Scholar