This Article 
 Bibliographic References 
 Add to: 
On the Design of a Single-Key-Lock Mechanism Based on Newton's Interpolating Polynomial
September 1989 (vol. 15 no. 9)
pp. 1135-1137

A single-key-lock (SKL) mechanism used for implementing the access matrix of a computer protection system is proposed. The key selection is very flexible. The lock values are generated recursively using the Newton interpolating polynomial. A new user/file can be inserted into the system without recomputing all locks/keys. Since the computational load of the key-lock operation depends on the key positions in the access matrix, a user-hierarchy structure can be constructed for the mechanism. Thus, the smallest key value is assigned to a user who accesses the information resources more frequently than others, in order to reduce the average computation time. An example is included to illustrate this idea.

[1] C. C. Chang, "On the design of a key-lock-pair mechanism in information protection systems,"BIT, vol. 26, pp. 410-417, July 1986.
[2] D.E. Denning,Cryptography and Data Security, Addison-Wesley Publishing Co., Reading, Mass., 1982.
[3] G. S. Graham and P. J. Denning, "Protection-principles and practice," inProc. AFIPS 1972 SJCC, vol. 40, pp. 417-429.
[4] D. E. Knuth,The Art of Computer Programming, Vol. 2, Seminumerical Algorithms. Reading, MA: Addison-Wesley, 1981.
[5] J. H. Saltzer and M. D. Schroeder, "The protection of information in computer systems,"Proc. IEEE, vol. 63, pp. 1278-1308, Sept. 1975.
[6] M. L. Wu and T. Y. Hwang, "Access control with single-key-lock,"IEEE Trans. Software Eng., vol. SE-10, no. 2, pp. 185-191, Mar. 1984.
[7] E. H. Lu, W. Y. Hwang, L. Harn, and J. Y. Lee, "VLSI architectures for computing polynomials in GF(2n)," inProc. 5th Int. Conf. Systems Engineering, Dayton, OH, Sept. 11-12, 1987.

Index Terms:
recursive generation; single-key-lock mechanism; access matrix; computer protection system; key selection; lock values; Newton interpolating polynomial; user/file; computational load; key positions; user-hierarchy structure; information resources; interpolation; polynomials; security of data
Chi-Sung Laih, Lein Harn, Jau-Yien Lee, "On the Design of a Single-Key-Lock Mechanism Based on Newton's Interpolating Polynomial," IEEE Transactions on Software Engineering, vol. 15, no. 9, pp. 1135-1137, Sept. 1989, doi:10.1109/32.31371
Usage of this product signifies your acceptance of the Terms of Use.