TY - JOUR
T1 - Provably-secure time-bound hierarchical key assignment schemes
AU - Ateniese, Giuseppe
AU - De Santis, Alfredo
AU - Ferrara, Anna Lisa
AU - Masucci, Barbara
PY - 2006
Y1 - 2006
N2 - A time-bound hierarchical key assignment scheme is a method to assign time-dependent encryption keys to a set of classes in a partially ordered hierarchy, in such a way that the key of a higher class can be used to derive the keys of all classes lower down in the hierarchy, according to temporal constraints.In this paper we design and analyze time-bound hierarchical key assignment schemes which are provably-secure and efficient. We first consider the unconditionally secure setting and we show a tight lower bound on the size of the private information distributed to each class. Then, we consider the computationally secure setting and obtain several results: We first prove that a recently proposed scheme is insecure against collusion attacks. Hence, motivated by the need for provably-secure schemes, we propose two different constructions for time-bound hierarchical key assignment schemes. The first one is based on symmetric encryption schemes, whereas, the second one makes use of bilinear maps. These appear to be the first constructions of time-bound hierarchical key assignment schemes which are simultaneously practical and provably-secure.
AB - A time-bound hierarchical key assignment scheme is a method to assign time-dependent encryption keys to a set of classes in a partially ordered hierarchy, in such a way that the key of a higher class can be used to derive the keys of all classes lower down in the hierarchy, according to temporal constraints.In this paper we design and analyze time-bound hierarchical key assignment schemes which are provably-secure and efficient. We first consider the unconditionally secure setting and we show a tight lower bound on the size of the private information distributed to each class. Then, we consider the computationally secure setting and obtain several results: We first prove that a recently proposed scheme is insecure against collusion attacks. Hence, motivated by the need for provably-secure schemes, we propose two different constructions for time-bound hierarchical key assignment schemes. The first one is based on symmetric encryption schemes, whereas, the second one makes use of bilinear maps. These appear to be the first constructions of time-bound hierarchical key assignment schemes which are simultaneously practical and provably-secure.
KW - Access control
KW - Key assignment
KW - Provable security
UR - http://www.scopus.com/inward/record.url?scp=34547282859&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=34547282859&partnerID=8YFLogxK
U2 - 10.1145/1180405.1180441
DO - 10.1145/1180405.1180441
M3 - Conference article
AN - SCOPUS:34547282859
SN - 1543-7221
SP - 288
EP - 297
JO - Proceedings of the ACM Conference on Computer and Communications Security
JF - Proceedings of the ACM Conference on Computer and Communications Security
M1 - 1180441
T2 - CCS 2006: 13th ACM Conference on Computer and Communications Security
Y2 - 30 October 2006 through 3 November 2006
ER -