A supervising authenticated encryption scheme for multilevel security

Chien Lung Hsu*, Liang Peng Chang, Tzong Chen Wu

*Corresponding author for this work

Research output: Contribution to journalJournal Article peer-review

3 Scopus citations

Abstract

Access to secret data should be managed to allow authorized people only. An authenticated encryption scheme can be used to protect valuable information or secret data for data confidentiality, authentication, non-repudiation and integrity. In this paper, the authors propose a new supervising authenticated encryption scheme for multilevel security which deals with the monitor and access control problems found in hierarchical organization, for protecting valuable authenticated encryption messages from being disclosed by malicious adversary. The proposed scheme provides two effective access control mechanisms, one is the partial access control and the other is the complete access control, which allows management superiors to monitor or access authenticated encryption messages received by inferiors within a hierarchical organization. Considering user privacy, the partial access control mechanism allows only a superior to access the "intended" authenticated encrypted information. In case of some special scenario (e.g., the monitored inferior is dead or dismissed), the complete access control mechanism allows the superior to access "all" authenticated encrypted messages received by the monitored inferior.

Original languageEnglish
Pages (from-to)1087-1095
Number of pages9
JournalInternational Journal of Innovative Computing, Information and Control
Volume7
Issue number3
StatePublished - 03 2011
Externally publishedYes

Keywords

  • Access control
  • Authenticated encryption
  • Monitor
  • Multilevel security

Fingerprint

Dive into the research topics of 'A supervising authenticated encryption scheme for multilevel security'. Together they form a unique fingerprint.

Cite this