1 / 6

RSA-Based Time-Bound Hierarchical Key Assignment for Electronic Article Subscription

This study presents an RSA-based hierarchical key assignment scheme for electronic article subscriptions. In this model, various journal subscription packages are offered with time-bound access. Each journal is secured with its own encryption key, and users receive a unique user key that permits decryption only for the journals they are authorized to access. The hierarchical structure allows for flexible assignment of keys based on subscription levels, ensuring that users can access journals within their subscribed timeframes while maintaining robust security protocols.

ayasha
Télécharger la présentation

RSA-Based Time-Bound Hierarchical Key Assignment for Electronic Article Subscription

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. An RSA-Based Time-Bound Hierarchical Key Assignment Scheme for Electronic Article Subscription

  2. Electronic Article Subscription • ACM publishes lots of journals periodically • Different packages of journals for subscription options • Users subscribe packages for different time periods • Only subscribed users can access the journals published in the time periods the users subscribed to

  3. Electronic Article Subscription • The journals can be just posted online, but encrypted • Each journal is encrypted by a different key • Each user has one user key • The user key can be used to decrypt only the journals the user are entitled to access

  4. Key Assignment • All packages can be structured as a hierarchy • If a user subscribes a package p_i for time periods from t_1 to t_2, then a user key K_i,(t_1,t_2) will be assigned to the user • Each journal belong to package p_j, published in time t, will be encrypted by a key K_j,t

  5. Key Derivation • K_i,(t_1,t_2) can derive K_j,t if and only if P_i is a higher package than P_j and t_1 ≤ t ≤ t_2

  6. An Example

More Related