Cryptographic role-based security mechanisms based on role-key hierarchy

Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Huaixi Wang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

15 Scopus citations

Abstract

Even though role-based access control (RBAC) can tremendously help us minimize the complexity in administering users, it is still needed to realize the notion of roles at the resource level. In this paper, we propose a practical cryptographic RBAC model, called role-key hierarchy model, to support various security features including signature and encryption based on role-key hierarchy. With the help of rich algebraic structure of elliptic curve, we introduce a role-based cryptosystem construction to verify the rationality and validity of our proposed model. Also, a proof-of-concept prototype implementation and performance evaluation are discussed to demonstrate the feasibility and efficiency of our mechanisms.

Original languageEnglish (US)
Title of host publicationProceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010
Pages314-319
Number of pages6
DOIs
StatePublished - 2010
Event5th ACM Symposium on Information, Computer and Communication Security, ASIACCS 2010 - Beijing, China
Duration: Apr 13 2010Apr 16 2010

Publication series

NameProceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010

Conference

Conference5th ACM Symposium on Information, Computer and Communication Security, ASIACCS 2010
CountryChina
CityBeijing
Period4/13/104/16/10

Keywords

  • access control
  • pairing-based cryptosystem
  • role-based cryptosystem
  • role-key hierarchy

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture
  • Information Systems
  • Software

Fingerprint Dive into the research topics of 'Cryptographic role-based security mechanisms based on role-key hierarchy'. Together they form a unique fingerprint.

Cite this