Efficient provably-secure hierarchical key assignment schemes

被引:21
|
作者
De Santis, Alfredo [1 ]
Ferrara, Anna Lisa [2 ]
Masucci, Barbara [1 ]
机构
[1] Univ Salerno, Dipartimento Informat, I-84084 Fisciano, SA, Italy
[2] Univ Southampton, Southampton SO17 1BJ, Hants, England
关键词
Access control; Key assignment; Provable security; Efficient key derivation; BROADCAST ENCRYPTION; ACCESS-CONTROL; TREE;
D O I
10.1016/j.tcs.2011.06.024
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A hierarchical key assignment scheme is a method to assign some private information and encryption keys to a set of classes in a partially ordered hierarchy, in such a way that the private information of a higher class can be used to derive the keys of all classes lower down in the hierarchy. In this paper we design and analyze hierarchical key assignment schemes which are provably secure and support dynamic updates to the hierarchy with local changes to the public information and without requiring any private information to be re-distributed. We first consider the problem of constructing a hierarchical key assignment scheme by using as a building block a symmetric encryption scheme. We propose a new construction which is provably secure with respect to key indistinguishability, requires a single computational assumption, and improves on previous proposals. Then, we show how to construct a hierarchical key assignment scheme by using as a building block a public-key broadcast encryption scheme. In particular, one of our constructions provides constant private information and public information linear in the number of classes in the hierarchy. (C) 2011 Elsevier B.V. All rights reserved.
引用
收藏
页码:5684 / 5699
页数:16
相关论文
共 50 条
  • [31] Hierarchical Key Assignment Schemes with Key Rotation
    Belfiore, Roberta Cimorelli
    De Santis, Alfredo
    Ferrara, Anna Lisa
    Masucci, Barbara
    [J]. PROCEEDINGS OF THE 29TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2024, 2024, : 171 - 182
  • [32] An Efficient and Provably-Secure Coercion-Resistant E-Voting Protocol
    Haghighat, Alireza Toroghi
    Dousti, Mohammad Sadeq
    Jalili, Rasool
    [J]. 2013 ELEVENTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2013, : 161 - 168
  • [33] Provably-secure programming languages for remote evaluation
    Volpano, D
    [J]. ACM SIGPLAN NOTICES, 1997, 32 (01) : 117 - 119
  • [34] ON THE DESIGN OF PROVABLY-SECURE CRYPTOGRAPHIC HASH FUNCTIONS
    DESANTIS, A
    YUNG, M
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1991, 473 : 412 - 431
  • [35] An efficient, provably-secure DAG based consensus mechanism for industrial internet of things
    Sasikumar, A.
    Senthilkumar, N.
    Subramaniyaswamy, V
    Kotecha, Ketan
    Indragandhi, V
    Ravi, Logesh
    [J]. INTERNATIONAL JOURNAL OF INTERACTIVE DESIGN AND MANUFACTURING - IJIDEM, 2023, 17 (05): : 2197 - 2207
  • [36] Efficient and provably-secure certificateless short signature scheme from bilinear pairings
    Du, Hongzhen
    Wen, Qiaoyan
    [J]. COMPUTER STANDARDS & INTERFACES, 2009, 31 (02) : 390 - 394
  • [37] An efficient provably-secure certificateless signature scheme for Internet-of-Things deployment
    Jia, Xiaoying
    He, Debiao
    Liu, Qin
    Choo, Kim-Kwang Raymond
    [J]. AD HOC NETWORKS, 2018, 71 : 78 - 87
  • [38] An Efficient and Provably-Secure Identity-based Signcryption Scheme for Multiple PKGs
    Jin, Zhengping
    Zuo, Huijuan
    Du, Hongzhen
    Wen, Qiaoyan
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, 2008, : 189 - 193
  • [39] Verifiable Hierarchical Key Assignment Schemes
    Ferrara, Anna Lisa
    Paci, Federica
    Ricciardi, Chiara
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXXV, 2021, 12840 : 357 - 376
  • [40] A secure and efficient time-bound hierarchical key assignment scheme
    Chien, Hung-Yu
    Tang, Yuan-Liang
    Chen, Ying-Lun
    [J]. IMECS 2007: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2007, : 371 - +