• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

Computer Engineering & Science

Previous Articles     Next Articles

Key management schemes based on access
control and Chinese remainder theorem in database

YAN Xi-xi1,HU Qian-wei1,TANG Yong-li1,YE Qing1,LI Zi-chen2   

  1. (1.College of Computer Science and Technology,Henan Polytechnic University,Jiaozuo 454003;
    2.College of Information Engineering,Beijing Institute of Graphic Communication,Beijing 102600,China)

     
  • Received:2015-12-07 Revised:2016-05-03 Online:2017-08-25 Published:2017-08-25

Abstract:

Since the number of data items keys is larger, much higher security is needed in database encryption systems. In view of this question, we propose new key management schemes based on access control and Chinese remainder theorem which makes the management of data items keys convenient. A large number of the data items keys Ki which the user  ui has access to, can be compounded to user class keys
uki when the user applies for the key, then this key is saved. When the user decrypts the data, user class keys  uki  are broken down into key data items using the system tables and the Chinese remainder theorem. The schemes can solve the problems of high time cost on processing data and more system resources occupation, thus improving the efficiency and security of the key management in the cipher text database. Experiments and comparison prove the significant improvement in efficiency and security of key management.
 

Key words: database encryption, RBAC, Chinese remainder theorem, key management