2007
DOI: 10.1007/978-3-540-74456-6_34
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Provably-Secure Hierarchical Key Assignment Schemes

Abstract: A hierarchical key assignment scheme is a method to assign some private information and encryption keys to a set of classes in a partially ordered hierarchy, in such a way that the private information of a higher class can be used to derive the keys of all classes lower down in the hierarchy.In this paper we design and analyze hierarchical key assignment schemes which are provablysecure and support dynamic updates to the hierarchy with local changes to the public information and without requiring any private i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0
1

Year Published

2011
2011
2017
2017

Publication Types

Select...
7
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 22 publications
(22 citation statements)
references
References 24 publications
0
21
0
1
Order By: Relevance
“…The rich literature on the interplay between cryptography and access control ranges from schemes that employ encryption and/or key-distribution schemes to implement various forms of hierarchical access control [21], [3], [30], [4], [16] to the design and implementation of cryptographic file systems [27], [7], [11], [26] and on to the recent cryptographic primitives motivated by access control [37], [24], [28], [31], [12], [6]. However, while the syntax, functionality and security of the primitives (e.g.…”
Section: B Related Workmentioning
confidence: 99%
“…The rich literature on the interplay between cryptography and access control ranges from schemes that employ encryption and/or key-distribution schemes to implement various forms of hierarchical access control [21], [3], [30], [4], [16] to the design and implementation of cryptographic file systems [27], [7], [11], [26] and on to the recent cryptographic primitives motivated by access control [37], [24], [28], [31], [12], [6]. However, while the syntax, functionality and security of the primitives (e.g.…”
Section: B Related Workmentioning
confidence: 99%
“…De Santis et al [12] proposed a construction which is based on symmetric encryption schemes only, achieves KI security and is simpler than the KI-secure scheme proposed in [8]. The construction uses only a chosen plaintext secure symmetric encryption scheme and the required private key storage is small at one key per class.…”
Section: Comparison With Previous Schemesmentioning
confidence: 99%
“…Formally, the hierarchy is modelled as a partially ordered set (poset), each data item is labelled by a class u in the hierarchy, and is encrypted using the encryption key k u corresponding to that class. Now a user, given access to the private information S u , can derive the relevant encryption key k v for any descendant class v, and hence gain access to the data of class v. Since the original paper by Akl and Taylor, a large number of different schemes have been proposed, offering different trade-offs in terms of the amount of public and private storage required and the complexity of key derivation -see for example [2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17]. Many additional issues are addressed in these works: time-dependent constraints, dynamic addition and removal of classes, and revocation, for example.…”
mentioning
confidence: 99%
“…They proposed an HKA scheme to enforce an HAC policy. After that, many researches proposed methods for improving performance, supporting dynamic access control policies, or providing distinct features [2,3,12,16,19,20,24,26,30]. Atallah et al formalized the security requirement for HKA schemes and provided an efficient and provably-secure HKA scheme against key recovery attacks [3].…”
Section: Introductionmentioning
confidence: 99%