A DYNAMIC ACCESS-CONTROL SCHEME BASED UPON THE KNAPSACK-PROBLEM

被引:1
|
作者
JAN, JK [1 ]
WANG, SJ [1 ]
机构
[1] NATL TAIWAN UNIV,DEPT ELECT ENGN,TAIPEI 106,TAIWAN
关键词
ACCESS CONTROL; CRYPTOSYSTEM; INFORMATION PROTECTION SYSTEM; KNAPSACK PROBLEM;
D O I
10.1016/0898-1221(93)90061-Y
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
A new dynamic access control scheme for information protection systems is proposed in this paper. The main idea of it is inspired by the concept of the trapdoor knapsack problem proposed by Merkle and Hellman. Since the knapsack problem is an NP-complete problem, the security of access control is achieved henceforth. Our scheme associates each user with some user keys and each file with some file keys. There is a positive integer set of S'; through a simple formula on keys and S', the corresponding access privilege can be easily revealed in the protection system. Moreover, by employing our scheme, insertion or deletion of the user/file can be processed effectively with only a few previously defined keys and locks required to be modified.
引用
收藏
页码:75 / 86
页数:12
相关论文
共 50 条
  • [21] THERMAL IMAGING PUTS NEW FACE ON ACCESS-CONTROL PROBLEM
    KOPROWSKI, G
    R&D MAGAZINE, 1995, 37 (02): : 41 - 42
  • [22] A SURROGATE RELAXATION BASED ALGORITHM FOR A GENERAL QUADRATIC MULTI-DIMENSIONAL KNAPSACK-PROBLEM
    DJERDJOUR, M
    MATHUR, K
    SALKIN, HM
    OPERATIONS RESEARCH LETTERS, 1988, 7 (05) : 253 - 258
  • [23] A Secure and Efficient Access-Control Scheme Based on Blockchain and CP-ABE for UAV Swarm
    Han, Pengbin
    Sui, Aina
    Wu, Jiang
    DRONES, 2025, 9 (02)
  • [25] A HYBRID DYNAMIC-PROGRAMMING BRANCH-AND-BOUND ALGORITHM FOR THE MULTIPLE-CHOICE KNAPSACK-PROBLEM
    DYER, ME
    RIHA, WO
    WALKER, J
    JOURNAL OF COMPUTATIONAL AND APPLIED MATHEMATICS, 1995, 58 (01) : 43 - 54
  • [26] SECURE ACCESS-CONTROL AND MAC-BASED SIGNATURES
    BEKER, H
    INFORMATION AGE, 1988, 10 (01): : 20 - 22
  • [27] A Relaxed Knapsack-Problem Based Decomposition Heuristic for Large-Scale Multistage Stochastic Programs
    Zeng, Zuo
    Cremaschi, Selen
    28TH EUROPEAN SYMPOSIUM ON COMPUTER AIDED PROCESS ENGINEERING, 2018, 43 : 519 - 524
  • [28] ACCESS-CONTROL AND VERIFICATION IN PETRI-NET-BASED HYPERDOCUMENTS
    STOTTS, PD
    FURUTA, R
    COMPASS 89 : PROCEEDINGS OF THE FOURTH ANNUAL CONFERENCE ON COMPUTER ASSURANCE: SYSTEMS INTEGRITY, SOFTWARE SAFETY AND PROCESS SECURITY, 1989, : 49 - 55
  • [29] Combining static and dynamic analysis for automatic identification of precise access-control policies
    Centonze, Paolina
    Flynn, Robert J.
    Pistoia, Marco
    TWENTY-THIRD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2007, : 292 - +
  • [30] A New Anonymous Conference Authentication Scheme Based on Knapsack Problem
    Wang, Bin
    Guo, Yun-fei
    Zhou, Jia
    Zhang, Jian-hui
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 512 - 515