DocumentCode
59415
Title
On the Equivalence of Two Security Notions for Hierarchical Key Assignment Schemes in the Unconditional Setting
Author
Cafaro, Massimo ; Civino, Roberto ; Masucci, Barbara
Author_Institution
Dept. of Eng. for Innovation, Univ. of Salento, Lecce, Italy
Volume
12
Issue
4
fYear
2015
fDate
July-Aug. 1 2015
Firstpage
485
Lastpage
490
Abstract
The access control problem in a hierarchy can be solved by using a hierarchical key assignment scheme, where each class is assigned an encryption key and some private information. A formal security analysis for hierarchical key assignment schemes has been traditionally considered in two different settings, i.e., the unconditionally secure and the computationally secure setting, and with respect to two different notions: security against key recovery (KR-security) and security with respect to key indistinguishability (KI-security), with the latter notion being cryptographically stronger. Recently, Freire, Paterson and Poettering proposed strong key indistinguishability (SKI-security) as a new security notion in the computationally secure setting, arguing that SKI-security is strictly stronger than KI-security in such a setting. In this paper we consider tthehe unconditionally secure setting for hierarchical key assignment schemes. In such a setting the security of the schemes is not based on specific unproven computational assumptions, i.e., it relies on the theoretical impossibility of breaking them, despite the computational power of an adversary coalition. We prove that, in this setting, SKI-security is not stronger than KI-security, i.e., the two notions are fully equivalent from an information-theoretic point of view.
Keywords
authorisation; private key cryptography; public key cryptography; KR-security; SKI-security; access control problem; computationally secure setting; encryption key; formal security analysis; hierarchical key assignment schemes; security notions; strong key indistinguishability; unconditionally secure setting; Access control; Educational institutions; Encryption; Entropy; Random variables; Access controls; coding and information theory; data dependencies; hierarchical design; information flow controls;
fLanguage
English
Journal_Title
Dependable and Secure Computing, IEEE Transactions on
Publisher
ieee
ISSN
1545-5971
Type
jour
DOI
10.1109/TDSC.2014.2355841
Filename
6894147
Link To Document