Dynamic and Efficient Key Management for Access Hierarchies
Download
Author
M. Atallah, K. Frikken, and M. Blanton
Tech report number
CERIAS TR 2006-02
Entry type
inproceedings
Abstract
The problem of key management in an access hierarchy has elicited much interest in the literature. The hierarchy is modeled as a set of partially ordered classes (represented as a directed graph), and a user who obtains access (i.e., a key) to a certain class can also obtain access to all descendant classes of her class through key derivation. Our solution to the above problem has the following properties: (i) only hash functions are used for a node to derive a descendant's key from its own key; (ii) the space complexity of the public information is the same as that of storing the hierarchy; (iii) the private information at a class consists of a single key associated with that class; (iv) updates (revocations, additions, etc.) are handled locally in the hierarchy; (v) the scheme is provably secure against collusion; and (vi) key derivation by a node of its descendant's key is bounded by the number of bit operations linear in the length of the path between the nodes. Whereas many previous schemes had some of these properties, ours is the first that satisfies all of them. Moreover, for trees (and other "recursively decomposable" hierarchies), we are the first to achieve a worst- and average-case number of bit operations for key derivation that is exponentially better than the depth of a balanced hierarchy (double-exponentially better if the hierarchy is unbalanced, i.e., "tall and skinny"); this is achieved with only a constant increase in the space for the hierarchy. We also show how with simple modifications our scheme can handle extensions proposed by Crampton of the standard hierarchies to "limited depth" and reverse inheritance. The security of our scheme relies only on the use of pseudo-random functions.
Download
Date
2005 – 11
Address
New York, NY, USA
Booktitle
ACM Conference on Computer and Communications Security (CCS)
Key alpha
atallah
Pages
190--201
Publisher
ACM Press
Affiliation
Purdue University
Publication Date
2005-11-01
Isbn
1-59593-226-7
Keywords
derivation, efficient key, hierarchical access control, key management
Language
English

