Cryptographic role-based security mechanisms based on role-key hierarchy

  • Authors:
  • Yan Zhu;Gail-Joon Ahn;Hongxin Hu;Huaixi Wang

  • Affiliations:
  • Peking University, Beijing, China and Key Laboratory of Network and Software Security Assurance (Peking University), Ministry of Education, China;Arizona State University, Tempe, AZ;Arizona State University, Tempe, AZ;Peking University, Beijing, China

  • Venue:
  • ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Even though role-based access control (RBAC) can tremendously help us minimize the complexity in administering users, it is still needed to realize the notion of roles at the resource level. In this paper, we propose a practical cryptographic RBAC model, called role-key hierarchy model, to support various security features including signature and encryption based on role-key hierarchy. With the help of rich algebraic structure of elliptic curve, we introduce a role-based cryptosystem construction to verify the rationality and validity of our proposed model. Also, a proof-of-concept prototype implementation and performance evaluation are discussed to demonstrate the feasibility and efficiency of our mechanisms.