Summary: | 碩士 === 國防管理學院 === 國防資訊研究所 === 96 === One of the problems encountered in storage and retrieval of technical documents is that the legal users are always hindered from accessing the confidential documents. This study provides a mechanism to categorize the documents to different classes according to the level of secrecy and then protect each class with hierarchical cryptograph keys. By doing so, the access control of documents in different classes become clear-cut and firm.
The theories composed of hierarchical cryptograph keys include Polynomial Functions, Inverse Matrix and ElGamal theory. In summary, hierarchical cryptograph keys has three features: protect a document depending on the authority of its user, avoid unauthorized access and modifications, and distinguish between access and modification authorities to meet the needs in practice.
|