Please use this identifier to cite or link to this item: http://localhost/handle/Hannan/606833
Title: Hierarchical and Shared Access Control
Authors: Arcangelo Castiglione;Alfredo De Santis;Barbara Masucci;Francesco Palmieri;Aniello Castiglione;Jin Li;Xinyi Huang
subject: Key assignment|Shared key reconstruction|Generalized access control|Provable security|Generalized access model|Multiple access structures
Year: 2016
Publisher: IEEE
Abstract: Access control ensures that only the authorized users of a system are allowed to access certain resources or tasks. Usually, according to their roles and responsibilities, users are organized in hierarchies formed by a certain number of disjoint classes. Such hierarchies are implemented by assigning a key to each class, so that the keys for descendant classes can be efficiently derived from classes higher in the hierarchy. However, pure hierarchical access may represent a limitation in many real-world cases. In fact, sometimes it is necessary to ensure access to a resource or task by considering both its directly responsible user and a group of users possessing certain credentials. In this paper, we first propose a novel model that generalizes the conventional hierarchical access control paradigm, by extending it to certain additional sets of qualified users. Afterward, we propose two constructions for hierarchical key assignment schemes in this new model, which are provably secure with respect to key indistinguishability. In particular, the former construction relies on both symmetric encryption and perfect secret sharing, whereas, the latter is based on public-key threshold broadcast encryption.
URI: http://localhost/handle/Hannan/138056
http://localhost/handle/Hannan/606833
ISSN: 1556-6013
1556-6021
volume: 11
issue: 4
Appears in Collections:2016

Files in This Item:
File Description SizeFormat 
7366590.pdf3.54 MBAdobe PDFThumbnail
Preview File
Title: Hierarchical and Shared Access Control
Authors: Arcangelo Castiglione;Alfredo De Santis;Barbara Masucci;Francesco Palmieri;Aniello Castiglione;Jin Li;Xinyi Huang
subject: Key assignment|Shared key reconstruction|Generalized access control|Provable security|Generalized access model|Multiple access structures
Year: 2016
Publisher: IEEE
Abstract: Access control ensures that only the authorized users of a system are allowed to access certain resources or tasks. Usually, according to their roles and responsibilities, users are organized in hierarchies formed by a certain number of disjoint classes. Such hierarchies are implemented by assigning a key to each class, so that the keys for descendant classes can be efficiently derived from classes higher in the hierarchy. However, pure hierarchical access may represent a limitation in many real-world cases. In fact, sometimes it is necessary to ensure access to a resource or task by considering both its directly responsible user and a group of users possessing certain credentials. In this paper, we first propose a novel model that generalizes the conventional hierarchical access control paradigm, by extending it to certain additional sets of qualified users. Afterward, we propose two constructions for hierarchical key assignment schemes in this new model, which are provably secure with respect to key indistinguishability. In particular, the former construction relies on both symmetric encryption and perfect secret sharing, whereas, the latter is based on public-key threshold broadcast encryption.
URI: http://localhost/handle/Hannan/138056
http://localhost/handle/Hannan/606833
ISSN: 1556-6013
1556-6021
volume: 11
issue: 4
Appears in Collections:2016

Files in This Item:
File Description SizeFormat 
7366590.pdf3.54 MBAdobe PDFThumbnail
Preview File
Title: Hierarchical and Shared Access Control
Authors: Arcangelo Castiglione;Alfredo De Santis;Barbara Masucci;Francesco Palmieri;Aniello Castiglione;Jin Li;Xinyi Huang
subject: Key assignment|Shared key reconstruction|Generalized access control|Provable security|Generalized access model|Multiple access structures
Year: 2016
Publisher: IEEE
Abstract: Access control ensures that only the authorized users of a system are allowed to access certain resources or tasks. Usually, according to their roles and responsibilities, users are organized in hierarchies formed by a certain number of disjoint classes. Such hierarchies are implemented by assigning a key to each class, so that the keys for descendant classes can be efficiently derived from classes higher in the hierarchy. However, pure hierarchical access may represent a limitation in many real-world cases. In fact, sometimes it is necessary to ensure access to a resource or task by considering both its directly responsible user and a group of users possessing certain credentials. In this paper, we first propose a novel model that generalizes the conventional hierarchical access control paradigm, by extending it to certain additional sets of qualified users. Afterward, we propose two constructions for hierarchical key assignment schemes in this new model, which are provably secure with respect to key indistinguishability. In particular, the former construction relies on both symmetric encryption and perfect secret sharing, whereas, the latter is based on public-key threshold broadcast encryption.
URI: http://localhost/handle/Hannan/138056
http://localhost/handle/Hannan/606833
ISSN: 1556-6013
1556-6021
volume: 11
issue: 4
Appears in Collections:2016

Files in This Item:
File Description SizeFormat 
7366590.pdf3.54 MBAdobe PDFThumbnail
Preview File