Abstract
In this paper, we review briefly Akl and Taylor’s cryptographic solution of multilevel security problem. We propose new key management systems for multilevel security using various one-way functions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Akl, S.G., Taylor, P.D.: Cryptographic Solution to a Multilevel Security Problem. In: CRYPTO 1982, pp. 237–249 (1982)
Akl, S.G., Taylor, P.D.: Cryptographic Solution to a Problem of Access Control in a Hierarchy. ACM Trans. Comput. Syst. 1(3), 239–248 (1983)
Buchmann, J., Willams, H.C.: A key-exchange system based on imaginary quadratic fields. J. Cryptology 1, 107–118 (1988)
Cohen, H.: A course in Computational Algebraic Number Theory. Springer, Berlin (1995)
Delfs, H., Knebel, H.: Introduction to Cryptography: Principles and Applications. Springer, Berlin (2002)
Denning, D.E.: Cryptography and Data Security. Addison-Wesley, Reading (1982)
Kim, H., Moon, S.: Public-key cryptosystems based on class semigroups of imaginary quadratic non-maximal orders. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol. 2727, pp. 488–497. Springer, Heidelberg (2003)
MacKinnon, S.J., Akl, S.G.: New Key Generation Algorithms for Multilevel Security. In: IEEE Symposium on Security and Privacy, pp. 72–78 (1983)
MacKinnon, S.J., Taylor, P.D., Meijer, H., Akl, S.G.: An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Trans. computers 34, 797–802 (1985)
Menezes, A.J., Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)
Mollin, R.A.: Quadratics. CRC Press, Boca Raton (1996)
Rivest, R.L., Shamir, A., Adelman, L.: A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM 21, 120–126 (1978)
Schneier, B.: Applied Cryptography. John Wiley & Sons, Inc., Chichester (1996)
Stinson, D.R.: Cryptography: Theory and Practice. CRC Press, Boca Raton (2002)
Trotter, W.T.: Combinatorics and Partially Ordered Sets: Dimension Theory. The Johns Hopkins Univ. Press, Baltimore and London (1992)
Zanardo, P., Zannier, U.: The class semigroup of orders in number fields. Math. Proc. Camb. Phil. Soc. 115, 379–391 (1994)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, H., Park, B., Ha, J., Lee, B., Park, D. (2005). New Key Management Systems for Multilevel Security. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2005. ICCSA 2005. Lecture Notes in Computer Science, vol 3481. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11424826_26
Download citation
DOI: https://doi.org/10.1007/11424826_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25861-2
Online ISBN: 978-3-540-32044-9
eBook Packages: Computer ScienceComputer Science (R0)