13.07.2015 Views

A cryptographic solution for general access control - University of ...

A cryptographic solution for general access control - University of ...

A cryptographic solution for general access control - University of ...

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

470 Yibing Kong et al.typically substantially slower than symmetric key cryptosystems [13]. There<strong>for</strong>e,our data based <strong>solution</strong> is not so efficient, especially when m or k is big. In thissection, we propose a key based <strong>solution</strong>, which solves the above problems. Ouridea <strong>of</strong> key based <strong>solution</strong> is derived from our data based <strong>solution</strong>: instead <strong>of</strong>sharing a message, we share its encryption key. The technique used in our keybased <strong>solution</strong> has been used by some secure broadcasting systems, e.g. [16,17].In contrast to those secure broadcasting systems, our key based <strong>solution</strong> appliesto a different area: <strong>general</strong> <strong>access</strong> <strong>control</strong>.In addition to the system elements listed <strong>for</strong> our data based <strong>solution</strong> (seesection 4.2), key based <strong>solution</strong> requires a symmetric key cryptosystem. Here wedenote its encryption function as SE and its decryption function as SD. Thissymmetric key cryptosystem is used to encrypt data items and the encryptionkeys are shared by a public key cryptosystem and CRT.The key based <strong>solution</strong> is depicted by the following scenario. If a subject s iwantstoshareamessagem with k subjects s i1 ,s i2 , ..., s ik ∈ S, s i per<strong>for</strong>ms thefollowing operations:B1. randomly choose a symmetric key K R ;B2. use K R to encrypt m: c = SE KR (m);B3. ∀s j ∈{s i1 ,s i2 , ..., s ik },calculateE Ksj (K R );B4. find the CRT <strong>solution</strong> x to the following k simultaneous congruences:(1). x ≡ E Ksi1 (K R )modn si1 .(2). x ≡ E Ksi2 (K R )modn si2 ....(k). x ≡ E Ksik (K R )modn sik .B5. store x||c in SDB, wherethesymbol|| means concatenation.For a subject s j ∈ {s i1 ,s i2 , ..., s ik }, to <strong>access</strong> m, s j needs to computeE Ksj (K R )=x mod n sj ;thenusesprivatekeyKs −1jto retrieve the symmetrickey K R , i.e. K R = D K−1(E Ksj (Ks R )); finally uses K R to recover m, i.e.jm = SD KR (c).In our key based <strong>solution</strong>, authorization alterations are processed in the followingway. For a dynamic data item, whenever its authorization changes, alloperations from B1 to B5 are re-per<strong>for</strong>med based on the new group <strong>of</strong> authorizedsubjects. For a static data item, if a subject is revoked from <strong>access</strong>ing thedata item, to prevent the subject from using the old symmetric key to retrievethe data item, all operations from B1 to B5 are re-per<strong>for</strong>med based on the newgroup <strong>of</strong> authorized subjects; if a subject is granted <strong>access</strong> to the data item, there-encryption <strong>of</strong> data item is not needed because the old symmetric key can stillbe used. Thus the trans<strong>for</strong>mation from SCS 1 to SCS 2 (see section 4.4) can beused to generate a new share ciphertext <strong>for</strong> the old symmetric key such thatthe newly authorized subject can retrieve the old symmetric key to decrypt thedata item.In contrast to data based <strong>solution</strong>, multiple public key encryptions are per<strong>for</strong>medon a symmetric key and one symmetric key encryption is per<strong>for</strong>med on

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!