Paper 2010/188

Cryptographic Role-based Security Mechanisms based on Role-Key Hierarchy

Yan Zhu, Gail-Joon Ahn, Hongxin Hu, and Huaixi Wang

Abstract

Even though role-based access control (RBAC) can tremendously help us minimize the complexity in administering users, it is still needed to realize the notion of roles at the resource level. In this paper, we propose a practical cryptographic RBAC model, called role-key hierarchy model, to support various security features including signature, identification and encryption based on role-key hierarchy. With the help of rich algebraic structure of elliptic curve, we introduce a role-based cryptosystem construction to verify the rationality and validity of our proposed model. Also, a proof-of-concept prototype implementation and performance evaluation are iscussed to demonstrate the feasibility and efficiency of our mechanisms.

Note: In this version, we give a more complete proof in the appendix for the theorems in this paper.

Metadata
Available format(s)
PDF PS
Category
Cryptographic protocols
Publication info
Published elsewhere. AsiaCCS 2010
Keywords
Access ControlRole-based CryptosystemRole-Key HierarchyPairing-based Cryptosystem
Contact author(s)
wanghuaixi @ gmail com
History
2010-06-29: last of 2 revisions
2010-04-09: received
See all versions
Short URL
https://ia.cr/2010/188
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2010/188,
      author = {Yan Zhu and Gail-Joon Ahn and Hongxin Hu and Huaixi Wang},
      title = {Cryptographic Role-based Security Mechanisms based on Role-Key Hierarchy},
      howpublished = {Cryptology ePrint Archive, Paper 2010/188},
      year = {2010},
      note = {\url{https://eprint.iacr.org/2010/188}},
      url = {https://eprint.iacr.org/2010/188}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.