Access control and signatures via quorum secret sharing

被引:43
|
作者
Naor, M [1 ]
Wool, A
机构
[1] Weizmann Inst Sci, Dept Appl Math & Comp Sci, IL-76100 Rehovot, Israel
[2] Lucent Technol, Bell Labs, Murray Hill, NJ 07974 USA
基金
以色列科学基金会;
关键词
quorum systems; replication; secret sharing; security; cryptography;
D O I
10.1109/71.722223
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We suggest a method of controlling the access to a secure database via quorum systems. A quorum system is a collection of sets (quorums) every two of which have a nonempty intersection. Quorum systems have been used for a number of applications in the area of distributed systems. We propose a separation between access servers, which are protected and trustworthy, but may be outdated, and the data servers, which may all be compromised. The main paradigm is that only the servers in a complete quorum can collectively grant (or revoke) access permission. The method we suggest ensures that, after authorization is revoked, a cheating user Alice will not be able to access the data even if many access servers still consider her authorized and even if the complete raw database is available to her. The method has a low overhead in terms of communication and computation. It can also be converted into a distributed system for issuing secure signatures. An important building block in our method is the use of secret sharing schemes that realize the access structures of quorum systems. We provide several efficient constructions of such schemes which may be of interest in their own right.
引用
收藏
页码:909 / 922
页数:14
相关论文
共 50 条
  • [1] Private Access Control for Function Secret Sharing
    Servan-Schreiber, Sacha
    Beyzerov, Simon
    Yablon, Eli
    Park, Hyojae
    2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2023, : 809 - 828
  • [2] Verifiable secret sharing for general access structures, with application to fully distributed proxy signatures
    Herranz, J
    Sáez, G
    FINANCIAL CRYPTOGRAPHY, PROCEEDINGS, 2003, 2742 : 286 - 302
  • [3] Secret sharing with access structures in a hierarchy
    Chang, CC
    Lin, CH
    Lee, W
    Hwang, PC
    18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, : 31 - 34
  • [4] Affine Boolean classification in secret image sharing for progressive quality access control
    Bhattacharjee, Tapasi
    Rout, Ranjeet Kumar
    Maity, Santi P.
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 33 : 16 - 29
  • [5] Access control aware data retrieval for secret sharing based database outsourcing
    Mohammad Ali Hadavi
    Rasool Jalili
    Leila Karimi
    Distributed and Parallel Databases, 2016, 34 : 505 - 534
  • [6] Access control aware data retrieval for secret sharing based database outsourcing
    Hadavi, Mohammad Ali
    Jalili, Rasool
    Karimi, Leila
    DISTRIBUTED AND PARALLEL DATABASES, 2016, 34 (04) : 505 - 534
  • [7] A proactive secret sharing for server assisted threshold signatures
    Yang, Jong-Phil
    Rhee, Kyung Hyune
    Sakurai, Kouichi
    HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2006, 4208 : 250 - 259
  • [8] Practical Threshold Signatures with Linear Secret Sharing Schemes
    Bozkurt, Ilker Nadi
    Kaya, Kamer
    Selcuk, Ali Aydm
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2009, 2009, 5580 : 167 - 178
  • [9] Realizing secret sharing with general access structure
    Harn, Lein
    Hsu, Chingfang
    Zhang, Mingwu
    He, Tingting
    Zhang, Maoyuan
    INFORMATION SCIENCES, 2016, 367 : 209 - 220
  • [10] Secret sharing schemes with bipartite access structure
    Padrö, Carles
    Sâez, German
    2000, IEEE, Piscataway, NJ, United States (46)