Efficient provably-secure hierarchical key assignment schemes

被引:21
|
作者
De Santis, Alfredo [1 ]
Ferrara, Anna Lisa [2 ]
Masucci, Barbara [1 ]
机构
[1] Univ Salerno, Dipartimento Informat, I-84084 Fisciano, SA, Italy
[2] Univ Southampton, Southampton SO17 1BJ, Hants, England
关键词
Access control; Key assignment; Provable security; Efficient key derivation; BROADCAST ENCRYPTION; ACCESS-CONTROL; TREE;
D O I
10.1016/j.tcs.2011.06.024
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A hierarchical key assignment scheme is a method to assign some private information and encryption keys to a set of classes in a partially ordered hierarchy, in such a way that the private information of a higher class can be used to derive the keys of all classes lower down in the hierarchy. In this paper we design and analyze hierarchical key assignment schemes which are provably secure and support dynamic updates to the hierarchy with local changes to the public information and without requiring any private information to be re-distributed. We first consider the problem of constructing a hierarchical key assignment scheme by using as a building block a symmetric encryption scheme. We propose a new construction which is provably secure with respect to key indistinguishability, requires a single computational assumption, and improves on previous proposals. Then, we show how to construct a hierarchical key assignment scheme by using as a building block a public-key broadcast encryption scheme. In particular, one of our constructions provides constant private information and public information linear in the number of classes in the hierarchy. (C) 2011 Elsevier B.V. All rights reserved.
引用
收藏
页码:5684 / 5699
页数:16
相关论文
共 50 条
  • [1] Efficient provably-secure hierarchical key assignment schemes
    De Santis, Alfredo
    Ferrara, Anna Lisa
    Masucci, Barbara
    [J]. MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE 2007, PROCEEDINGS, 2007, 4708 : 371 - +
  • [2] Provably-Secure Time-Bound Hierarchical Key Assignment Schemes
    Ateniese, Giuseppe
    De Santis, Alfredo
    Ferrara, Anna Lisa
    Masucci, Barbara
    [J]. JOURNAL OF CRYPTOLOGY, 2012, 25 (02) : 243 - 270
  • [3] Provably-Secure Time-Bound Hierarchical Key Assignment Schemes
    Giuseppe Ateniese
    Alfredo De Santis
    Anna Lisa Ferrara
    Barbara Masucci
    [J]. Journal of Cryptology, 2012, 25 : 243 - 270
  • [4] New Constructions for Provably-Secure Time-Bound Hierarchical Key Assignment Schemes
    De Santis, Alfredo
    Ferrara, Anna Lisa
    Masucci, Barbara
    [J]. SACMAT'07: PROCEEDINGS OF THE 12TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2007, : 133 - 138
  • [5] New constructions for provably-secure time-bound hierarchical key assignment schemes
    De Santis, Alfredo
    Ferrara, Anna Lisa
    Masucci, Barbara
    [J]. THEORETICAL COMPUTER SCIENCE, 2008, 407 (1-3) : 213 - 230
  • [6] Provably Secure Key Assignment Schemes from Factoring
    Freire, Eduarda S. V.
    Paterson, Kenneth G.
    [J]. INFORMATION SECURITY AND PRIVACY, 2011, 6812 : 292 - 309
  • [7] On session key construction in provably-secure key establishment protocols
    Choo, KKR
    Boyd, C
    Hitchcock, Y
    [J]. PROGRESS IN CRYPTOLOGY - MYCRYPT 2005, 2005, 3715 : 116 - 131
  • [8] Provably-secure schemes for basic query support in outsourced databases
    Amanatidis, Georgios
    Boldyreva, Alexandra
    O'Neill, Adam
    [J]. DATA AND APPLICATIONS SECURITY XXI, PROCEEDINGS, 2007, 4602 : 14 - +
  • [9] Efficient and identity-based signcryption with provably-secure
    Wen, Yiling
    Ma, Jianfeng
    Moon, Sangjae
    [J]. International Journal of Digital Content Technology and its Applications, 2010, 4 (07) : 148 - 153
  • [10] Efficient and provably-secure certificateless blind signature scheme
    Yang, Xiao-Yuan
    Chen, Hai-Bin
    Guo, Dun-Tao
    [J]. Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2010, 36 (SUPPL. 2): : 64 - 69