Hierarchical and Shared Key Assignment

被引:20
|
作者
Castiglione, Arcangelo [1 ]
De Santis, Alfredo [1 ]
Masucci, Barbara [1 ]
机构
[1] Univ Salerno, Dipartimento Informat, I-84084 Fisciano, SA, Italy
关键词
Generalized access control; Generalized access model; Key assignment; Provable security; Shared key reconstruction; Multiple access structures; SECURITY; CONSTRUCTIONS;
D O I
10.1109/NBiS.2014.106
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Access control ensures that only the authorized users of a system are allowed to access certain resources or tasks. Usually, according to their powers and responsibilities, users are organized in hierarchies formed by a certain number of disjoint classes. Such hierarchies are implemented by assigning a key to each class, so that the keys for descendant classes can be derived efficiently from classes higher in the hierarchy. However, in many cases the only hierarchical access represents a limitation. Indeed, sometimes it might be useful or even necessary to ensure the access to a resource or task to both his direct responsible (or owner) and a group of users possessing certain credentials. In this paper, we first propose a novel model that extends the conventional hierarchical access and allows such access even by certain sets of qualified users. Afterwards, we propose a construction for hierarchical key assignment schemes in this new model. The proposed construction is provably secure with respect to key indistinguishability and relies on both symmetric encryption and perfect secret sharing.
引用
收藏
页码:263 / 270
页数:8
相关论文
共 50 条
  • [1] Hierarchical Key Assignment Schemes with Key Rotation
    Belfiore, Roberta Cimorelli
    De Santis, Alfredo
    Ferrara, Anna Lisa
    Masucci, Barbara
    PROCEEDINGS OF THE 29TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2024, 2024, : 171 - 182
  • [2] Verifiable Hierarchical Key Assignment Schemes
    Ferrara, Anna Lisa
    Paci, Federica
    Ricciardi, Chiara
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXV, 2021, 12840 : 357 - 376
  • [3] A Model of Hierarchical Key Assignment Scheme
    ZHANG Zhigang~ 1
    2. School of Mathematical Science
    WuhanUniversityJournalofNaturalSciences, 2006, (06) : 1597 - 1600
  • [4] Hierarchical key assignment without public-key cryptography
    Lin, CH
    COMPUTERS & SECURITY, 2001, 20 (07) : 612 - 619
  • [5] A model of hierarchical key assignment scheme with CRT
    Zhao, Jing
    Zhang, Zhigang
    Xu, Maozhi
    CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 815 - +
  • [6] Key Indistinguishability versus Strong Key Indistinguishability for Hierarchical Key Assignment Schemes
    Castiglione, Arcangelo
    De Santis, Alfredo
    Masucci, Barbara
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (04) : 451 - 460
  • [7] Time-Bound Hierarchical Key Assignment: An Overview
    Zhu, Wen Tao
    Deng, Robert H.
    Zhou, Jianying
    Rao, Feng
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2010, E93D (05): : 1044 - 1052
  • [8] Cryptographic key assignment scheme for hierarchical access control
    Wu, TC
    Chang, CC
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2001, 16 (01): : 25 - 28
  • [9] New hierarchical assignment without public key cryptography
    Chien, HY
    Jan, JK
    COMPUTERS & SECURITY, 2003, 22 (06) : 523 - 526
  • [10] A Hierarchical Shared Key Algorithm in Wireless Sensor Networks
    Sun, Zeyu
    Wu, Weiguo
    Xing, Xiaofei
    Li, Chuanfeng
    Nie, Yalin
    Cao, Yangjie
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2015, 2015, 9532 : 405 - 412