Title: An efficient access control scheme in user hierarchy based on polynomial interpolation and hash function

Authors: Ashok Kumar Das; Adrijit Goswami; Vanga Odelu

Addresses: Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, 500 032, India ' Department of Mathematics, Indian Institute of Technology, Kharagpur, 721 302, India ' Department of Mathematics, Rajiv Gandhi University of Knowledge Technologies, Hyderabad, 500 032, India

Abstract: The hierarchical cryptographic key assignment is used to assign cryptographic keys to a set of partially ordered security classes so that the user in a higher security class can derive the cryptographic secret keys of the other users in a lower security class. In this paper, we propose a practical solution for dynamic access problems in a user hierarchy, which uses the polynomial interpolation and hash function. When compared with other related recent existing access control schemes, in our scheme the computational complexity and the required storage space are significantly reduced. In addition, our scheme provides provable security. Furthermore, our scheme is easy to implement and therefore, it is more suitable for practical applications.

Keywords: access control; user hierarchy; key management; polynomial interpolation; hash function; security; cryptography; key assignment; cryptographic keys.

DOI: 10.1504/IJCNDS.2014.059434

International Journal of Communication Networks and Distributed Systems, 2014 Vol.12 No.2, pp.129 - 151

Received: 06 May 2012
Accepted: 24 Mar 2013

Published online: 21 Jun 2014 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article