• Non ci sono risultati.

Abstract NewInsightsonCryptographicHierarchicalAccessControl:Models,SchemesandAnalysis Universit`adegliStudidiSalerno

N/A
N/A
Protected

Academic year: 2021

Condividi "Abstract NewInsightsonCryptographicHierarchicalAccessControl:Models,SchemesandAnalysis Universit`adegliStudidiSalerno"

Copied!
3
0
0

Testo completo

(1)

Universit` a degli Studi di Salerno

Dipartimento di Informatica

DOTTORATO DI RICERCA IN INFORMATICA CICLO XIV - NUOVA SERIE

Tesi di Dottorato in Informatica

New Insights on Cryptographic Hierarchical Access Control:

Models, Schemes and Analysis

Abstract

Candidate Arcangelo Castiglione

Tutor Co-Tutor

Prof. Alfredo De Santis Prof. Barbara Masucci

Coordinator Prof. Gennaro Costagliola

2014/2015

(2)

Abstract

Nowadays the current network-centric world has given rise to several security concerns regarding the access control management, which en- sures that only authorized users are given access to certain resources or tasks. In particular, according to their respective roles and respon- sibilities, users are typically organized into hierarchies composed of several disjoint classes (security classes). A hierarchy is characterized by the fact that some users may have more access rights than others, according to a top-down inclusion paradigm following specific hier- archical dependencies. A user with access rights for a given class is granted access to objects stored in that class, as well as to all the de- scendant ones in the hierarchy. The problem of key management for such hierarchies consists in assigning a key to each class of the hierar- chy, so that the keys for descendant classes can be efficiently obtained from users belonging to classes at a higher level in the hierarchy.

In this thesis we analyze the security of hierarchical key assignment schemes according to different notions: security with respect to key indistinguishability and against key recovery [4], as well as the two recently proposed notions of security with respect to strong key in- distinguishability and against strong key recovery [42]. More precisely, we first explore the relations between all security notions and, in par- ticular, we prove that security with respect to strong key indistin- guishability is not stronger than the one with respect to key indistin- guishability. Afterwards, we propose a general construction yielding a hierarchical key assignment scheme that ensures security against strong key recovery, given any hierarchical key assignment scheme which guarantees security against key recovery.

(3)

Moreover, we define the concept of hierarchical key assignment schemes supporting dynamic updates, formalizing the relative secu- rity model. In particular, we provide the notions of security with respect to key indistinguishability and key recovery, by taking into ac- count the dynamic changes to the hierarchy. Furthermore, we show how to construct a hierarchical key assignment scheme supporting dy- namic updates, by using as a building block a symmetric encryption scheme. The proposed construction is provably secure with respect to key indistinguishability, provides efficient key derivation and updat- ing procedures, while requiring each user to store only a single private key.

Finally, we propose a novel model that generalizes the conventional hierarchical access control paradigm, by extending it to certain addi- tional sets of qualified users. Afterwards, we propose two construc- tions for hierarchical key assignment schemes in this new model, which are provably secure with respect to key indistinguishability. In par- ticular, the former construction relies on both symmetric encryption and perfect secret sharing, whereas, the latter is based on public-key threshold broadcast encryption.

Riferimenti

Documenti correlati

In questa tesi abbiamo analizzato la sicurezza degli schemi di as- segnamento chiavi gerarchico in base a diverse nozioni: sicurezza rispetto a key indistinguishability e key

DEPARTMENT FOR EDUCATION AND SKILLS (DfES), QUALIFICATIONS AND CURRICULUM AUTHORITY (QCA) and LEARNING AND SKILLS COUNCIL (LSC) (2002). Key Skills: Joint DfES/QCA/LSC Question

Descriptors: basic skills, minimum competences, mathematics, natural sciences, civics, computer literacy, cross-curricular competences, curriculum, learning difficulty, evaluation

This succession rests unconformably on Middle Permian to Lower Jurassic Karoo deposits (Sakamena and Isalo groups; Besairie and Collignon, 1972; Wescott and Diggens, 1998 ) and

Because of an exact flavor (color-flavor diagonal G C+F ) symmetry present here, which is broken by individual vortex solutions, our vortices possess continuous moduli.. As will be

Definition 1.2 Una Una Key Key Transport Transport Protocol Protocol è una Key è una Key Establishment Protocol in cui uno dei mandanti genera la Establishment Protocol

The goal of this paper is twofold: to expand the strategic application field of triple helix as a systemic problem setting and problem solving tool and to use it to face one of the

3D modelling, architectural representation, laser scanner survey, lighting project, virtual