Cryptology ePrint Archive: Report 2010/188
Cryptographic Role-based Security Mechanisms based on Role-Key Hierarchy
Yan Zhu and Gail-Joon Ahn and Hongxin Hu and Huaixi Wang
Abstract: Even though role-based access control (RBAC) can tremendously help us minimize the complexity in administering users, it is still needed to realize the notion of roles at the resource level. In this paper, we propose a practical cryptographic RBAC model, called role-key hierarchy model, to support various security features including signature, identification and encryption based on role-key hierarchy. With the help of rich algebraic structure of elliptic curve, we introduce a role-based cryptosystem construction to verify the rationality and validity of our proposed model. Also, a proof-of-concept prototype implementation and performance evaluation are iscussed to demonstrate the feasibility and efficiency of our mechanisms.
Category / Keywords: cryptographic protocols / Access Control, Role-based Cryptosystem, Role-Key Hierarchy, Pairing-based Cryptosystem
Publication Info: AsiaCCS 2010
Date: received 6 Apr 2010, last revised 29 Jun 2010
Contact author: wanghuaixi at gmail com
Available format(s): Postscript (PS) | Compressed Postscript (PS.GZ) | PDF | BibTeX Citation
Note: In this version, we give a more complete proof in the appendix for the theorems in this paper.
Version: 20100629:142036 (All versions of this report)
Short URL: ia.cr/2010/188
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]