Hierarchical and Shared Access Control

被引:57
作者
Castiglione, Arcangelo [1 ]
De Santis, Alfredo [1 ]
Masucci, Barbara [1 ]
Palmieri, Francesco [1 ]
Castiglione, Aniello [1 ]
Li, Jin [2 ]
Huang, Xinyi [3 ]
机构
[1] Univ Salerno, Dept Comp Sci, I-84084 Salerno, Italy
[2] Guangzhou Univ, Sch Comp Sci, Guangzhou 510006, Guangdong, Peoples R China
[3] Fujian Normal Univ, Sch Math & Comp Sci, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350117, Peoples R China
基金
中国国家自然科学基金;
关键词
Generalized access control; generalized access model; key assignment; provable security; shared key reconstruction; multiple access structures; KEY MANAGEMENT; SECURITY; CONSTRUCTIONS; SCHEME;
D O I
10.1109/TIFS.2015.2512533
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Access control ensures that only the authorized users of a system are allowed to access certain resources or tasks. Usually, according to their roles and responsibilities, users are organized in hierarchies formed by a certain number of disjoint classes. Such hierarchies are implemented by assigning a key to each class, so that the keys for descendant classes can be efficiently derived from classes higher in the hierarchy. However, pure hierarchical access may represent a limitation in many real-world cases. In fact, sometimes it is necessary to ensure access to a resource or task by considering both its directly responsible user and a group of users possessing certain credentials. In this paper, we first propose a novel model that generalizes the conventional hierarchical access control paradigm, by extending it to certain additional sets of qualified users. Afterward, we propose two constructions for hierarchical key assignment schemes in this new model, which are provably secure with respect to key indistinguishability. In particular, the former construction relies on both symmetric encryption and perfect secret sharing, whereas, the latter is based on public-key threshold broadcast encryption.
引用
收藏
页码:850 / 865
页数:16
相关论文
共 41 条
[1]   CRYPTOGRAPHIC SOLUTION TO A PROBLEM OF ACCESS-CONTROL IN A HIERARCHY [J].
AKL, SG ;
TAYLOR, PD .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1983, 1 (03) :239-248
[2]  
[Anonymous], 2704 IETF RFC
[3]  
Atallah MJ, 2007, LECT NOTES COMPUT SC, V4734, P515
[4]   Dynamic and Efficient Key Management for Access Hierarchies [J].
Atallah, Mikhail J. ;
Blanton, Marina ;
Fazio, Nelly ;
Frikken, Keith B. .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2009, 12 (03)
[5]  
Ateniese G., 2006, P 13 ACM C COMPUTER, P288
[6]   A note on time-bound hierarchical key assignment schemes [J].
Ateniese, Giuseppe ;
De Santis, Alfredo ;
Ferrara, Anna Lisa ;
Masucci, Barbara .
INFORMATION PROCESSING LETTERS, 2013, 113 (5-6) :151-155
[7]   Provably-Secure Time-Bound Hierarchical Key Assignment Schemes [J].
Ateniese, Giuseppe ;
De Santis, Alfredo ;
Ferrara, Anna Lisa ;
Masucci, Barbara .
JOURNAL OF CRYPTOLOGY, 2012, 25 (02) :243-270
[8]   A concrete security treatment of symmetric encryption [J].
Bellare, M ;
Desai, A ;
Jokipii, E ;
Rogaway, P .
38TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 1997, :394-403
[9]  
Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P259
[10]  
Bellare M., 1996, Advances in Cryptology - CRYPTO'96. 16th Annual International Cryptology Conference. Proceedings, P1