Abstract

The Key Assignment Scheme (KAS) is a well-studied cryptographic primitive used for hierarchical access control (HAC) in a multilevel organisation where the classes of people with higher privileges can access files of those with lower ones. Our first contribution is the formalization of a new cryptographic primitive, namely, KAS-AE that supports the aforementioned HAC solution with an additional authenticated encryption property. Next, we present three efficient KAS-AE schemes that solve the HAC and the associated authenticated encryption problem more efficiently – both with respect to time and memory – than the existing solutions that achieve it by executing KAS and AE separately. Our first KAS-AE construction is built by using the cryptographic primitive MLE (EUROCRYPT 2013) as a black box; the other two constructions (which are the most efficient ones) have been derived by cleverly tweaking the hash function FP (Indocrypt 2012) and the authenticated encryption scheme APE (FSE 2014). This high efficiency of our constructions is critically achieved by using two techniques: design of a mechanism for reverse decryption used for reduction of time complexity, and a novel key management scheme for optimizing storage requirements when organizational hierarchy forms an arbitrary access graph (instead of a linear graph). We observe that constructing a highly efficient KAS-AE scheme using primitives other than MLE, FP and APE is a non-trivial task. We leave it as an open problem. Finally, we provide a detailed comparison of all the KAS-AE schemes.

Highlights

  • Hierarchical Access Control (HAC) and the Key Assignment Scheme (KAS)

  • Our work mainly focuses on KAS-authenticated encryption (AE), we briefly revisit various KAS schemes below

  • Later we show that how this natural KAS-AE construction is vulnerable to an attack

Read more

Summary

Introduction

Hierarchical Access Control (HAC) and the Key Assignment Scheme (KAS). We summarize our main challenge below: Can we construct a secure KAS-AE scheme that solves HAC problem more efficiently than the simple combination of KAS and AE executed in that order?. Note that the very unique reverse decryption property – which, to the best of our knowledge, only exists inherently in the FP hash mode and the APE authenticated encryption scheme – has been used in [KP18] to construct efficient file-updatable message-locked encryption (FMLE) schemes.

Notation
Definitions
Ideal Permutation
Random Function
Source of message S
Graph Algorithms used in the Paper
Existing KAS schemes
Constructing KAS from KAS-chain
A New Cryptographic Primitive
KAS-AE from KAS and AE
KAS-AE-chain constructions
AChain
BChain
CChain
DChain
Modified Chain Partition using KAS-AE-chains
Building KAS-AE from MLE
Construction 1: A KAS-AE scheme based on MLE
Security of Construction 1
Building KAS-AE by Tweaking APE and FP
A KAS-AE scheme based on functionalities F1π and F2π
Security of Construction 2
A KAS-AE scheme based on functionalities G1π and G2π
Security of Construction 3
Comparison of various KAS-AE schemes
Conclusion and Future Work
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call