• DocumentCode
    59415
  • Title

    On the Equivalence of Two Security Notions for Hierarchical Key Assignment Schemes in the Unconditional Setting

  • Author

    Cafaro, Massimo ; Civino, Roberto ; Masucci, Barbara

  • Author_Institution
    Dept. of Eng. for Innovation, Univ. of Salento, Lecce, Italy
  • Volume
    12
  • Issue
    4
  • fYear
    2015
  • fDate
    July-Aug. 1 2015
  • Firstpage
    485
  • Lastpage
    490
  • Abstract
    The access control problem in a hierarchy can be solved by using a hierarchical key assignment scheme, where each class is assigned an encryption key and some private information. A formal security analysis for hierarchical key assignment schemes has been traditionally considered in two different settings, i.e., the unconditionally secure and the computationally secure setting, and with respect to two different notions: security against key recovery (KR-security) and security with respect to key indistinguishability (KI-security), with the latter notion being cryptographically stronger. Recently, Freire, Paterson and Poettering proposed strong key indistinguishability (SKI-security) as a new security notion in the computationally secure setting, arguing that SKI-security is strictly stronger than KI-security in such a setting. In this paper we consider tthehe unconditionally secure setting for hierarchical key assignment schemes. In such a setting the security of the schemes is not based on specific unproven computational assumptions, i.e., it relies on the theoretical impossibility of breaking them, despite the computational power of an adversary coalition. We prove that, in this setting, SKI-security is not stronger than KI-security, i.e., the two notions are fully equivalent from an information-theoretic point of view.
  • Keywords
    authorisation; private key cryptography; public key cryptography; KR-security; SKI-security; access control problem; computationally secure setting; encryption key; formal security analysis; hierarchical key assignment schemes; security notions; strong key indistinguishability; unconditionally secure setting; Access control; Educational institutions; Encryption; Entropy; Random variables; Access controls; coding and information theory; data dependencies; hierarchical design; information flow controls;
  • fLanguage
    English
  • Journal_Title
    Dependable and Secure Computing, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1545-5971
  • Type

    jour

  • DOI
    10.1109/TDSC.2014.2355841
  • Filename
    6894147