Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Article type: Research Article
Authors: Crampton, Jasona; * | Farley, Naomia | Gutin, Gregorya | Jones, Marka | Poettering, Bertramb
Affiliations: [a] Royal Holloway, University of London, UK | [b] Ruhr University Bochum, Germany
Correspondence: [*] Corresponding author: Jason Crampton, Information Security Group, Royal Holloway, University of London, Egham, TW20 9QY, UK. Tel.: +44 1784 443117; E-mail: jason.crampton@rhul.ac.uk.
Note: [1] This paper generalizes and extends our earlier results [in: Applied Cryptography and Network Security – 13th International Conference, ACNS 2015, Revised Selected Papers, Springer, 2015, pp. 389–408; in: Data and Applications Security and Privacy XXIX – 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Proceedings, Springer, 2015, pp. 330–345]. In particular, we define a new form of enforcement scheme that subsumes chain-based [in: Data and Applications Security and Privacy XXIX – 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Proceedings, Springer, 2015, pp. 330–345] and tree-based enforcement schemes [in: Applied Cryptography and Network Security – 13th International Conference, ACNS 2015, Revised Selected Papers, Springer, 2015, pp. 389–408]. We generalize results specific to these earlier schemes in order to support our more general framework.
Abstract: We may enforce an information flow policy by encrypting a protected resource and ensuring that only users authorized by the policy are able to decrypt the resource. In most schemes in the literature that use symmetric cryptographic primitives, each user is assigned a single secret and derives decryption keys using this secret and publicly available information. Recent work has challenged this approach by developing schemes, based on a chain partition of the information flow policy, that do not require public information for key derivation, the trade-off being that a user may need to be assigned more than one secret. In general, many different chain partitions exist for the same policy and, until now, it was not known how to compute an appropriate one. In this paper, we introduce the notion of a tree partition, of which chain partitions are a special case. We show how a tree partition may be used to define a cryptographic enforcement scheme and prove that such schemes can be instantiated in such a way as to preserve the strongest security properties known for cryptographic enforcement schemes. We establish a number of results linking the amount of secret material that needs to be distributed to users with a weighted acyclic graph derived from the tree partition. These results enable us to develop efficient algorithms for deriving tree and chain partitions that minimize the total amount of secret material that needs to be distributed.
Keywords: Access control, information flow policies, cryptographic enforcement, chains, forests, trees
DOI: 10.3233/JCS-16863
Journal: Journal of Computer Security, vol. 25, no. 6, pp. 511-535, 2017
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
sales@iospress.com
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
info@iospress.nl
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office info@iospress.nl
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
china@iospress.cn
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
如果您在出版方面需要帮助或有任何建, 件至: editorial@iospress.nl