Efficient provably-secure hierarchical key assignment schemes

被引:21
|
作者
De Santis, Alfredo [1 ]
Ferrara, Anna Lisa [2 ]
Masucci, Barbara [1 ]
机构
[1] Univ Salerno, Dipartimento Informat, I-84084 Fisciano, SA, Italy
[2] Univ Southampton, Southampton SO17 1BJ, Hants, England
关键词
Access control; Key assignment; Provable security; Efficient key derivation; BROADCAST ENCRYPTION; ACCESS-CONTROL; TREE;
D O I
10.1016/j.tcs.2011.06.024
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A hierarchical key assignment scheme is a method to assign some private information and encryption keys to a set of classes in a partially ordered hierarchy, in such a way that the private information of a higher class can be used to derive the keys of all classes lower down in the hierarchy. In this paper we design and analyze hierarchical key assignment schemes which are provably secure and support dynamic updates to the hierarchy with local changes to the public information and without requiring any private information to be re-distributed. We first consider the problem of constructing a hierarchical key assignment scheme by using as a building block a symmetric encryption scheme. We propose a new construction which is provably secure with respect to key indistinguishability, requires a single computational assumption, and improves on previous proposals. Then, we show how to construct a hierarchical key assignment scheme by using as a building block a public-key broadcast encryption scheme. In particular, one of our constructions provides constant private information and public information linear in the number of classes in the hierarchy. (C) 2011 Elsevier B.V. All rights reserved.
引用
收藏
页码:5684 / 5699
页数:16
相关论文
共 50 条
  • [21] Towards Provably-Secure Performance Locking
    Zaman, Monir
    Sengupta, Abhrajit
    Liu, Danqing
    Sinanoglu, Ozgur
    Makris, Yiorgos
    Rajendran, Jeyavijayan
    [J]. PROCEEDINGS OF THE 2018 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2018, : 1592 - 1597
  • [22] Asynchronous Provably-Secure Hidden Services
    Camacho, Philippe
    Krell, Fernando
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2018, 2018, 10808 : 179 - 197
  • [23] More efficient, provably-secure direct anonymous attestation from lattices
    El Kassem, Nada
    Chen, Liqun
    El Bansarkhani, Rachid
    El Kaafarani, Ali
    Camenisch, Jan
    Hough, Patrick
    Martins, Paulo
    Sousa, Leonel
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 99 : 425 - 458
  • [24] An efficient and provably-secure certificateless signature scheme without bilinear pairings
    He, D.
    Chen, J.
    Zhang, R.
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2012, 25 (11) : 1432 - 1442
  • [25] An Efficient and Provably-Secure Broadcast Authentication Scheme in Wireless Sensor Networks
    Guo, Rui
    Wen, Qiaoyan
    Jin, Zhengping
    Zhang, Hua
    Zhao, Jing
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2015, 16 (06): : 977 - 985
  • [26] A PROVABLY-SECURE STRONGLY-RANDOMIZED CIPHER
    MAUERER, UM
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1991, 473 : 361 - 373
  • [27] Provably-secure certificateless key encapsulation mechanism for e-healthcare system
    Shi, Hui-Xian
    Guo, Rui
    [J]. International Journal of Network Security, 2015, 17 (05) : 548 - 557
  • [28] A provably-secure authenticated key agreement protocol for remote patient monitoring IoMT
    Chen, Chien-Ming
    Liu, Shuangshuang
    Li, Xuanang
    Islam, S. K. Hafizul
    Das, Ashok Kumar
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 136
  • [29] Unconditionally secure key assignment schemes
    De Santis, A
    Ferrara, AL
    Masucci, B
    [J]. DISCRETE APPLIED MATHEMATICS, 2006, 154 (02) : 234 - 252
  • [30] Efficient Provably-Secure Dynamic ID-Based Authenticated Key Agreement Scheme With Enhanced Security Provision
    Abbasinezhad-Mood, Dariush
    Mazinani, Sayyed Majid
    Nikooghadam, Morteza
    Ostad-Sharif, Arezou
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (02) : 1227 - 1238