13.07.2015 Views

A cryptographic solution for general access control - University of ...

A cryptographic solution for general access control - University of ...

A cryptographic solution for general access control - University of ...

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

A Cryptographic Solution <strong>for</strong> General Access Control 463an efficient method <strong>for</strong> determining CRT <strong>solution</strong>s. This algorithm is listed asfollows (For further details, please refer to Chapter 14.5 <strong>of</strong> [13]).INPUT :Algorithm: Garner’s algorithm <strong>for</strong> CRTa positive integer n = ∏ ki=1 n i > 1, with gcd(n i ,n j ) = 1 <strong>for</strong> all i ≠ j,and a modular representation a(x) =(a 1 ,a 2 , ..., a k )<strong>of</strong>x <strong>for</strong> the n i .OUTPUT :theintegerx in radix b representation.1. For i from 2 to k do the following:1.1 C i ← 1.1.2 For j from 1 to (i − 1) do the following:u ← n −1j mod n i .C i ← u · C i mod n i .2. u ← a 1 , x ← u .3. For i from 2 to k do the following:u ← (a i − x) · C i mod n i , x ← x + u · ∏i−1j=1 n j .4. Return(x).The RSA algorithm [14] contains three parts: key generation, encryption anddecryption. Key generation works as follows: find a modulus n (n is a product <strong>of</strong>two large primes) and choose a number e (e is a number less than n and relativelyprime to φ(n), where φ(n) istheEuler’s totient function). Find another numberd such that ed ≡ 1modφ(n). The value e and d are called the public and privateexponents, respectively. The public key K is the pair (e, n); the private key K −1is the pair (d, n). The encryption <strong>of</strong> a message m with the public key K =(e, n),denoted by E K (m), is defined as:c = E K (m) =m e mod n .where c is the ciphertext produced by the encryption algorithm E. The decryption<strong>of</strong> a ciphertext c with the private key K −1 =(d, n), denoted by D K −1(c),is defined as:m = D K −1(c) =c d mod n .where m is the plaintext recovered by the decryption algorithm D.3 RRN SystemRRN system is a RSA based cryptosystem, which can be used not only <strong>for</strong><strong>access</strong> <strong>control</strong> in a hierarchy but also <strong>for</strong> <strong>general</strong> cases. RRN system is based onthe following principles [1].Definition 1. Two RSA encryption keys K 1 =(e 1 ,n 1 )andK 2 =(e 2 ,n 2 )aresaid to be compatible if e 1 = e 2 and n 1 and n 2 are relatively prime.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!