Shi Ronghua. AN AUTHENTICATION-DOUBLED ACCESS CONTROL SCHEME BASED ON ONE-WAY FUNCTION[J]. Journal of Electronics & Information Technology, 1997, 19(2): 278-281.
Citation:
Shi Ronghua. AN AUTHENTICATION-DOUBLED ACCESS CONTROL SCHEME BASED ON ONE-WAY FUNCTION[J]. Journal of Electronics & Information Technology, 1997, 19(2): 278-281.
Shi Ronghua. AN AUTHENTICATION-DOUBLED ACCESS CONTROL SCHEME BASED ON ONE-WAY FUNCTION[J]. Journal of Electronics & Information Technology, 1997, 19(2): 278-281.
Citation:
Shi Ronghua. AN AUTHENTICATION-DOUBLED ACCESS CONTROL SCHEME BASED ON ONE-WAY FUNCTION[J]. Journal of Electronics & Information Technology, 1997, 19(2): 278-281.
Based on a one-way function, this paper proposed an authentication-doubled access control scheme for information protection system. The scheme is safer than the previously proposed schemes. In the scheme, the user s secret key is used not only for computing the corresponding access privilege to the intended file, but also for authenticating the requesting user not to illegitimately access the protected file. The scheme can perform the access control in dynamic environments, such as change access priviledges and insert/delete users or files. Beside, the scheme is simple to establish.
Chang C C. On the design of a key-lock-pair mechanism in information protection systems, Bit, 1986, 26(4): 410-417.[2]Chang C C. An information protection scheme based upon number theory, The Computer Journal, 1987, 30(3): 249-253.[3]Jan J K. A single key access control scheme in information systems[J].Information Science.1990, 51(1):1-11[4]Laih C S, Harn L, Lee J Y. On the design of single-key-lock machanism base on Newtens interpolating[5]polynomials. IEEE Trans. on SE, 1989, SE-15(5): 1135-1137.[6]Williams H C. Computationally, `hard problems as a source for cryptosystems, In secure Conmmnmications and Asymmetric Cryptosystems, AAAS selected Symposium 69. Colorado: Westview press,1982,11-39.[7]施荣华.一种基于牛顿插值方法的动态密钥分配方案.长沙铁道学院学院.1994年12月(增刊):45-49.[8]Dime W, Helhnan M E. New directions in Cryptography IEEE Trans. on IT, 1976, IT-22(6): 644-654.