[Resource Topic] 2010/188: Cryptographic Role-based Security Mechanisms based on Role-Key Hierarchy

Welcome to the resource topic for 2010/188

Title:
Cryptographic Role-based Security Mechanisms based on Role-Key Hierarchy

Authors: Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Huaixi Wang

Abstract:

Even though role-based access control (RBAC) can tremendously help us minimize the complexity in administering users, it is still needed to realize the notion of roles at the resource level. In this paper, we propose a practical cryptographic RBAC model, called role-key hierarchy model, to support various security features including signature, identification and encryption based on role-key hierarchy. With the help of rich algebraic structure of elliptic curve, we introduce a role-based cryptosystem construction to verify the rationality and validity of our proposed model. Also, a proof-of-concept prototype implementation and performance evaluation are iscussed to demonstrate the feasibility and efficiency of our mechanisms.

ePrint: https://eprint.iacr.org/2010/188

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .