计算机科学与探索 ›› 2017, Vol. 11 ›› Issue (6): 921-931.DOI: 10.3778/j.issn.1673-9418.1604017

• 网络与信息安全 • 上一篇    下一篇

等级访问控制下密文数据库密钥管理方案研究

胡前伟1,2+,李子臣1,闫玺玺2   

  1. 1. 北京印刷学院 信息工程学院,北京 102600
    2. 河南理工大学 计算机科学与技术学院,河南 焦作 454003
  • 出版日期:2017-06-01 发布日期:2017-06-07

Research on Key Management Scheme for Hierarchical Access Control in Database

HU Qianwei1,2+, LI Zichen1, YAN Xixi2   

  1. 1. College of Information Engineering, Beijing Institute of Graphic Communication, Beijing 102600, China
    2. College of Computer Science and Technology, Henan Polytechnic University, Jiaozuo, Henan 454003, China
  • Online:2017-06-01 Published:2017-06-07

摘要: 针对等级体制下用户权限管理和访问密文数据库的问题,提出了基于椭圆曲线密码体制的密钥管理方案。该方案中每个用户都可以独立选择自己的用户密钥,并安全传送给可信中心,可信中心在收集完密钥参数之后使用椭圆曲线密码体制计算出具有偏序关系的用户关系参数。高级别用户利用关系参数和用户密钥便可以安全有效地推导出低级别用户的密钥信息,然后利用密钥信息解密低级别用户的密文数据库。方案中还考虑了偏序关系变化后密文数据库的更新方法。实验表明,安全等级的密钥推导和访问数据库具有较高的效率和安全性。

关键词: 密文数据库, 密钥管理, 椭圆曲线密码体制, 偏序关系, 用户分级

Abstract: This paper presents a key management scheme based on elliptic curve cryptosystem to solve the problem of rights management among hierarchical users and access the encrypted database. In the proposed scheme, each user can independently choose own user key, and securely transfer it to trusted center. The trusted center calculates the  relational parameters of the user having the partially ordered relation by using the elliptic curve cryptosystem after collecting the secret key parameters. The higher-privileged class will have the right to derive the key information created or owned by a user in a lower-privileged class, and then take advantage of it to decrypt the encrypted database which is also created by the lower-privileged class. The update method of the encrypted database is also considered after the partially ordered relation is changed. Experiments show that key generation, key derivation and access database have high efficiency and security.

Key words: encrypted database, key management, elliptic curve cryptosystem, partially ordered relation, user hierarchy