Hierarchical and Shared Key Assignment

被引:20
|
作者
Castiglione, Arcangelo [1 ]
De Santis, Alfredo [1 ]
Masucci, Barbara [1 ]
机构
[1] Univ Salerno, Dipartimento Informat, I-84084 Fisciano, SA, Italy
来源
2014 17TH INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS (NBIS 2014) | 2014年
关键词
Generalized access control; Generalized access model; Key assignment; Provable security; Shared key reconstruction; Multiple access structures; SECURITY; CONSTRUCTIONS;
D O I
10.1109/NBiS.2014.106
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Access control ensures that only the authorized users of a system are allowed to access certain resources or tasks. Usually, according to their powers and responsibilities, users are organized in hierarchies formed by a certain number of disjoint classes. Such hierarchies are implemented by assigning a key to each class, so that the keys for descendant classes can be derived efficiently from classes higher in the hierarchy. However, in many cases the only hierarchical access represents a limitation. Indeed, sometimes it might be useful or even necessary to ensure the access to a resource or task to both his direct responsible (or owner) and a group of users possessing certain credentials. In this paper, we first propose a novel model that extends the conventional hierarchical access and allows such access even by certain sets of qualified users. Afterwards, we propose a construction for hierarchical key assignment schemes in this new model. The proposed construction is provably secure with respect to key indistinguishability and relies on both symmetric encryption and perfect secret sharing.
引用
收藏
页码:263 / 270
页数:8
相关论文
共 50 条
  • [21] An Efficient Solution for Time-Bound Hierarchical Key Assignment Scheme
    Pan, Jeng-Shyang
    Wu, Tsu-Yang
    Chen, Chien-Ming
    Wang, Eric Ke
    GENETIC AND EVOLUTIONARY COMPUTING, VOL II, 2016, 388 : 3 - 9
  • [22] A secure and efficient time-bound hierarchical key assignment scheme
    Chien, Hung-Yu
    Tang, Yuan-Liang
    Chen, Ying-Lun
    IMECS 2007: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2007, : 371 - +
  • [23] A secure time-bound hierarchical key assignment scheme based on RSA public key cryptosystem
    Yeh, Jyh-haw
    INFORMATION PROCESSING LETTERS, 2008, 105 (04) : 117 - 120
  • [24] Hierarchical key assignment for black-box tracing with efficient ciphertext size
    Matsushita, Tatsuyuki
    Imai, Hideki
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2006, 4307 : 92 - +
  • [25] A Novel Time-bound Hierarchical Key Assignment Scheme for Mobile Agent
    Liu, Chia-Hui
    Chung, Yu-Fang
    Jhuo, Jin-De
    Chen, Tzer-Shyong
    Wang, Sheng-De
    INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS (IMECS 2010), VOLS I-III, 2010, : 258 - +
  • [26] Provably-Secure Time-Bound Hierarchical Key Assignment Schemes
    Giuseppe Ateniese
    Alfredo De Santis
    Anna Lisa Ferrara
    Barbara Masucci
    Journal of Cryptology, 2012, 25 : 243 - 270
  • [27] Applying Time-Bound Hierarchical Key Assignment in Wireless Sensor Networks
    Zhu, Wen Tao
    Deng, Robert H.
    Zhou, Jianying
    Bao, Feng
    INFORMATION AND COMMUNICATIONS SECURITY, 2011, 7043 : 306 - +
  • [28] Provably-Secure Time-Bound Hierarchical Key Assignment Schemes
    Ateniese, Giuseppe
    De Santis, Alfredo
    Ferrara, Anna Lisa
    Masucci, Barbara
    JOURNAL OF CRYPTOLOGY, 2012, 25 (02) : 243 - 270
  • [29] Merging: An efficient solution for a time-bound hierarchical key assignment scheme
    Wang, SY
    Laih, CS
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2006, 3 (01) : 91 - 100
  • [30] On the Equivalence of Two Security Notions for Hierarchical Key Assignment Schemes in the Unconditional Setting
    Cafaro, Massimo
    Civino, Roberto
    Masucci, Barbara
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (04) : 485 - 490