Title :
On compression of cryptographic keys
Author_Institution :
Sch. of Comput., Nat. Univ. of Singapore, Singapore
Abstract :
Any secured system can be modeled as a capability-based access control system in which each user is given a set of secret keys of the resources he is granted access to. In some systems which are sensitive to key storage cost, key derivation is commonly used. With a goal to minimize the maximum key storage per user, key compression based on key linking, that is, deriving one key from another without compromising security, is studied. A lower bound on key storage needed for a general access structure with key derivation is derived. This bound demonstrates the theoretic limit of any systems which do not trade off security and can be treated as a negative result to provide ground for designs with security tradeoff. A concrete, provably secure key linking scheme based on pseudorandom functions is given, along with an algorithm for finding optimal key linking patterns.
Keywords :
authorisation; data compression; private key cryptography; capability-based access control system; cryptographic key compression; key derivation; maximum key storage per user; optimal key linking patterns; provably secure key linking scheme; pseudorandom functions; secret keys; Access control; Concrete; Costs; Cryptographic protocols; Cryptography; Information security; Joining processes; Material storage; Permission; Secure storage;
Conference_Titel :
Information Theory, 2008. ISIT 2008. IEEE International Symposium on
Conference_Location :
Toronto, ON
Print_ISBN :
978-1-4244-2256-2
Electronic_ISBN :
978-1-4244-2257-9
DOI :
10.1109/ISIT.2008.4595309