Design and Applications of Hierarchical Key Management Schemes

碩士 === 國防管理學院 === 國防資訊研究所 === 96 === One of the problems encountered in storage and retrieval of technical documents is that the legal users are always hindered from accessing the confidential documents. This study provides a mechanism to categorize the documents to different classes according to th...

Full description

Bibliographic Details
Main Authors: Chen Wen Yen, 陳玟燕
Other Authors: 尹延齡
Format: Others
Language:zh-TW
Published: 2008
Online Access:http://ndltd.ncl.edu.tw/handle/45343925832352608439
Description
Summary:碩士 === 國防管理學院 === 國防資訊研究所 === 96 === One of the problems encountered in storage and retrieval of technical documents is that the legal users are always hindered from accessing the confidential documents. This study provides a mechanism to categorize the documents to different classes according to the level of secrecy and then protect each class with hierarchical cryptograph keys. By doing so, the access control of documents in different classes become clear-cut and firm. The theories composed of hierarchical cryptograph keys include Polynomial Functions, Inverse Matrix and ElGamal theory. In summary, hierarchical cryptograph keys has three features: protect a document depending on the authority of its user, avoid unauthorized access and modifications, and distinguish between access and modification authorities to meet the needs in practice.