Skip to main content

2016 | OriginalPaper | Buchkapitel

On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures

verfasst von : Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci, Francesco Palmieri, Aniello Castiglione

Erschienen in: Information Security and Privacy

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A hierarchical key assignment scheme distribute some private information and encryption keys to a set of classes in a partially ordered hierarchy, so that the private information of higher classes can be employed to derive the keys of classes lower down in the hierarchy. A hierarchical key assignment scheme for dynamic structures allows to make dynamic updates to the hierarchy, such as addition, deletion and modification of classes and relations among them, as well as the revocation of users.
In this work we analyze security notions for hierarchical key assignment schemes supporting dynamic structures. In particular, we first propose the notion of key recovery for those schemes. Furthermore, we extend to such schemes the strong key indistinguishability and strong key recovery security definitions proposed by Freire et al. for hierarchical key assignment schemes. Finally, we investigate the relations occurring between all the state-of-the-art security notions for hierarchical key assignment schemes supporting dynamic structures, showing implications and separations which hold between such notions. In detail, we prove that also in the case of dynamic structures, security with respect to strong key indistinguishability is equivalent to the one with respect to key indistinguishability.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
4.
Zurück zum Zitat Atallah, M.J., Blanton, M., Frikken, K.B.: Key management for non-tree access hierarchies. In: Ferraiolo, D.F., Ray, I. (eds.) Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, SACMAT 2006, Lake Tahoe, California, USA, 7–9 June 2006, pp. 11–18. ACM (2006). http://doi.acm.org/10.1145/1133058.1133062 Atallah, M.J., Blanton, M., Frikken, K.B.: Key management for non-tree access hierarchies. In: Ferraiolo, D.F., Ray, I. (eds.) Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, SACMAT 2006, Lake Tahoe, California, USA, 7–9 June 2006, pp. 11–18. ACM (2006). http://​doi.​acm.​org/​10.​1145/​1133058.​1133062
5.
Zurück zum Zitat Atallah, M.J., Blanton, M., Frikken, K.B.: Incorporating temporal capabilities in existing key management schemes. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 515–530. Springer, Heidelberg (2007). doi:10.1007/978-3-540-74835-9_34 CrossRef Atallah, M.J., Blanton, M., Frikken, K.B.: Incorporating temporal capabilities in existing key management schemes. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 515–530. Springer, Heidelberg (2007). doi:10.​1007/​978-3-540-74835-9_​34 CrossRef
6.
Zurück zum Zitat Atallah, M.J., Frikken, K.B., Blanton, M.: Dynamic and efficient key management for access hierarchies. In: Atluri, V., Meadows, C., Juels, A. (eds.) Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, 7–11 November 2005, pp. 190–202. ACM (2005). http://doi.acm.org/10.1145/1102120.1102147 Atallah, M.J., Frikken, K.B., Blanton, M.: Dynamic and efficient key management for access hierarchies. In: Atluri, V., Meadows, C., Juels, A. (eds.) Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, 7–11 November 2005, pp. 190–202. ACM (2005). http://​doi.​acm.​org/​10.​1145/​1102120.​1102147
7.
Zurück zum Zitat Ateniese, G., De Santis, A., Ferrara, A.L., Masucci, B.: Provably-securetime-bound hierarchical key assignment schemes. In: Juels, A., Wright, R.N., di Vimercati, S.D.C. (eds.) Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, October 30–November 3 2006, pp. 288–297. ACM (2006). http://doi.acm.org/10.1145/1180405.1180441 Ateniese, G., De Santis, A., Ferrara, A.L., Masucci, B.: Provably-securetime-bound hierarchical key assignment schemes. In: Juels, A., Wright, R.N., di Vimercati, S.D.C. (eds.) Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, October 30–November 3 2006, pp. 288–297. ACM (2006). http://​doi.​acm.​org/​10.​1145/​1180405.​1180441
9.
Zurück zum Zitat Cafaro, M., Civino, R., Masucci, B.: On the equivalence of two security notions for hierarchical key assignment schemes in the unconditional setting. IEEE Trans. Dependable Sec. Comput. 12(4), 485–490 (2015)CrossRef Cafaro, M., Civino, R., Masucci, B.: On the equivalence of two security notions for hierarchical key assignment schemes in the unconditional setting. IEEE Trans. Dependable Sec. Comput. 12(4), 485–490 (2015)CrossRef
12.
Zurück zum Zitat Castiglione, A., De Santis, A., Masucci, B., Palmieri, F., Castiglione, A., Li, J., Huang, X.: Hierarchical and shared access control. IEEE Trans. Inf. Forensics Secur. 11(4), 850–865 (2016). doi:10.1109/TIFS.2015.2512533 Castiglione, A., De Santis, A., Masucci, B., Palmieri, F., Castiglione, A., Li, J., Huang, X.: Hierarchical and shared access control. IEEE Trans. Inf. Forensics Secur. 11(4), 850–865 (2016). doi:10.​1109/​TIFS.​2015.​2512533
13.
Zurück zum Zitat Castiglione, A., De Santis, A., Masucci, B., et al.: Cryptographic hierarchical access control for dynamic structures. Manuscript Submitted for Publication in IEEE Transactions of Information Forensics and Security (2015) Castiglione, A., De Santis, A., Masucci, B., et al.: Cryptographic hierarchical access control for dynamic structures. Manuscript Submitted for Publication in IEEE Transactions of Information Forensics and Security (2015)
16.
Zurück zum Zitat D’Arco, P., De Santis, A., Ferrara, A.L., Masucci, B.: Security and tradeoffs of the Akl-Taylor scheme and its variants. In: Královič, R., Niwiński, D. (eds.) MFCS 2009. LNCS, vol. 5734, pp. 247–257. Springer, Heidelberg (2009). doi:10.1007/978-3-642-03816-7_22 CrossRef D’Arco, P., De Santis, A., Ferrara, A.L., Masucci, B.: Security and tradeoffs of the Akl-Taylor scheme and its variants. In: Královič, R., Niwiński, D. (eds.) MFCS 2009. LNCS, vol. 5734, pp. 247–257. Springer, Heidelberg (2009). doi:10.​1007/​978-3-642-03816-7_​22 CrossRef
18.
Zurück zum Zitat De Santis, A., Ferrara, A.L., Masucci, B.: Cryptographic key assignment schemes for any access control policy. Inf. Process. Lett. 92(4), 199–205 (2004)MathSciNetCrossRefMATH De Santis, A., Ferrara, A.L., Masucci, B.: Cryptographic key assignment schemes for any access control policy. Inf. Process. Lett. 92(4), 199–205 (2004)MathSciNetCrossRefMATH
21.
Zurück zum Zitat De Santis, A., Ferrara, A.L., Masucci, B.: Efficient provably-secure hierarchical key assignment schemes. In: Kučera, L., Kučera, A. (eds.) MFCS 2007. LNCS, vol. 4708, pp. 371–382. Springer, Heidelberg (2007). doi:10.1007/978-3-540-74456-6_34 CrossRef De Santis, A., Ferrara, A.L., Masucci, B.: Efficient provably-secure hierarchical key assignment schemes. In: Kučera, L., Kučera, A. (eds.) MFCS 2007. LNCS, vol. 4708, pp. 371–382. Springer, Heidelberg (2007). doi:10.​1007/​978-3-540-74456-6_​34 CrossRef
22.
Zurück zum Zitat De Santis, A., Ferrara, A.L., Masucci, B.: New constructions for provably-secure time-bound hierarchical key assignment schemes. In: Lotz, V., Thuraisingham, B.M. (eds.) Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, Sophia Antipolis, France, 20–22 June 2007, pp. 133–138. ACM (2007). http://doi.acm.org/10.1145/1266840.1266861 De Santis, A., Ferrara, A.L., Masucci, B.: New constructions for provably-secure time-bound hierarchical key assignment schemes. In: Lotz, V., Thuraisingham, B.M. (eds.) Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, Sophia Antipolis, France, 20–22 June 2007, pp. 133–138. ACM (2007). http://​doi.​acm.​org/​10.​1145/​1266840.​1266861
25.
Zurück zum Zitat Freire, E.S.V., Paterson, K.G.: Provably secure key assignment schemes from factoring. In: Parampalli, U., Hawkes, P. (eds.) ACISP 2011. LNCS, vol. 6812, pp. 292–309. Springer, Heidelberg (2011). doi:10.1007/978-3-642-22497-3_19 CrossRef Freire, E.S.V., Paterson, K.G.: Provably secure key assignment schemes from factoring. In: Parampalli, U., Hawkes, P. (eds.) ACISP 2011. LNCS, vol. 6812, pp. 292–309. Springer, Heidelberg (2011). doi:10.​1007/​978-3-642-22497-3_​19 CrossRef
26.
Zurück zum Zitat Freire, E.S.V., Paterson, K.G., Poettering, B.: Simple, efficient and strongly KI-secure hierarchical key assignment schemes. In: Dawson, E. (ed.) CT-RSA 2013. LNCS, vol. 7779, pp. 101–114. Springer, Heidelberg (2013)CrossRef Freire, E.S.V., Paterson, K.G., Poettering, B.: Simple, efficient and strongly KI-secure hierarchical key assignment schemes. In: Dawson, E. (ed.) CT-RSA 2013. LNCS, vol. 7779, pp. 101–114. Springer, Heidelberg (2013)CrossRef
31.
Zurück zum Zitat Lin, I.C., Hwang, M.S., Chang, C.C.: A new key assignment scheme for enforcing complicated access control policies in hierarchy. Future Gener. Comput. Syst. 19(4), pp. 457 – 462 (2003). http://www.sciencedirect.com/science/article/pii/S0167739X02002005. Selected Papers from the IEEE/ACM International Symposium on Cluster Computing and the Grid, Berlin-Brandenburg Academy of Sciences and Humanities, Berlin, Germany, 21–24 May 2002 Lin, I.C., Hwang, M.S., Chang, C.C.: A new key assignment scheme for enforcing complicated access control policies in hierarchy. Future Gener. Comput. Syst. 19(4), pp. 457 – 462 (2003). http://​www.​sciencedirect.​com/​science/​article/​pii/​S0167739X0200200​5. Selected Papers from the IEEE/ACM International Symposium on Cluster Computing and the Grid, Berlin-Brandenburg Academy of Sciences and Humanities, Berlin, Germany, 21–24 May 2002
32.
Zurück zum Zitat MacKinnon, S.J., Taylor, P.D., Meijer, H., Akl, S.G.: An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Trans. Comput. 34(9), 797–802 (1985). doi:10.1109/TC.1985.1676635 CrossRef MacKinnon, S.J., Taylor, P.D., Meijer, H., Akl, S.G.: An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Trans. Comput. 34(9), 797–802 (1985). doi:10.​1109/​TC.​1985.​1676635 CrossRef
38.
Zurück zum Zitat Tzeng, W.: A secure system for data access based on anonymous authentication and time-dependent hierarchical keys. In: Lin, F., Lee, D., Lin, B.P., Shieh, S., Jajodia, S. (eds.) Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei,Taiwan, 21–24 March 2006, pp. 223–230. ACM (2006). http://doi.acm.org/10.1145/1128817.1128851 Tzeng, W.: A secure system for data access based on anonymous authentication and time-dependent hierarchical keys. In: Lin, F., Lee, D., Lin, B.P., Shieh, S., Jajodia, S. (eds.) Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei,Taiwan, 21–24 March 2006, pp. 223–230. ACM (2006). http://​doi.​acm.​org/​10.​1145/​1128817.​1128851
39.
40.
Zurück zum Zitat Wu, T., Chang, C.: Cryptographic key assignment scheme for hierarchical access control. Comput. Syst. Sci. Eng. 16(1), 25–28 (2001) Wu, T., Chang, C.: Cryptographic key assignment scheme for hierarchical access control. Comput. Syst. Sci. Eng. 16(1), 25–28 (2001)
41.
Zurück zum Zitat Yeh, J., Chow, R., Newman, R.: A key assignment for enforcing access control policy exceptions. In: Proceedings of the International Symposium on Internet Technology, pp. 54–59 (1998) Yeh, J., Chow, R., Newman, R.: A key assignment for enforcing access control policy exceptions. In: Proceedings of the International Symposium on Internet Technology, pp. 54–59 (1998)
42.
Zurück zum Zitat Yeh, J.: An RSA-based time-bound hierarchical key assignment scheme for electronic article subscription. In: Herzog, O., Schek, H., Fuhr, N., Chowdhury, A., Teiken, W. (eds.) Proceedings of the 2005 ACM CIKM International Conference on Information and Knowledge Management, Bremen,Germany, 31 October–5 November 2005, pp. 285–286. ACM (2005). http://doi.acm.org/10.1145/1099554.1099629 Yeh, J.: An RSA-based time-bound hierarchical key assignment scheme for electronic article subscription. In: Herzog, O., Schek, H., Fuhr, N., Chowdhury, A., Teiken, W. (eds.) Proceedings of the 2005 ACM CIKM International Conference on Information and Knowledge Management, Bremen,Germany, 31 October–5 November 2005, pp. 285–286. ACM (2005). http://​doi.​acm.​org/​10.​1145/​1099554.​1099629
Metadaten
Titel
On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures
verfasst von
Arcangelo Castiglione
Alfredo De Santis
Barbara Masucci
Francesco Palmieri
Aniello Castiglione
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-40367-0_3