loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Author: Keith B. Frikken

Affiliation: Miami University, United States

Keyword(s): Hierarchical-based Access Control, Cryptographic Enforcement, Mitigating Key Sharing.

Related Ontology Subjects/Areas/Topics: Access Control ; Applied Cryptography ; Cryptographic Techniques and Key Management ; Data and Application Security and Privacy ; Data Engineering ; Data Protection ; Databases and Data Security ; Information and Systems Security ; Internet Technology ; Web Information Systems and Technologies

Abstract: In this paper, we consider the well-studied problem of cryptographic enforcement of hierarchical-based access control. While this problem is well-studied, a significant drawback to prior approaches is that if a corrupt user shares his key, then any user can access the content of the corrupt user. This is particularly damaging since it is not possible to determine the identity of the corrupt user, and almost all previous schemes require some rekeying in order to revoke a key. To mitigate this key sharing attack, we propose a new model for cryptographic enforcement: Identity-based key management (IBKM). In this framework, each key is associated with an identity and this identity is required to access content. This allows the system to trace the source of key leakage and to revoke users without rekeying. The main disadvantage of this framework is the scheme does not have the ability to provide anonymous access, but it can be used to provide pseudonymous access. The main contributions of this paper are formal definitions for IBKM and schemes for achieving IBKM. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.117.105.230

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
B. Frikken, K. (2012). Cryptographic Enforcement of Access Control while Mitigating Key Sharing. In Proceedings of the International Conference on Security and Cryptography (ICETE 2012) - SECRYPT; ISBN 978-989-8565-24-2; ISSN 2184-3236, SciTePress, pages 245-250. DOI: 10.5220/0004042602450250

@conference{secrypt12,
author={Keith {B. Frikken}.},
title={Cryptographic Enforcement of Access Control while Mitigating Key Sharing},
booktitle={Proceedings of the International Conference on Security and Cryptography (ICETE 2012) - SECRYPT},
year={2012},
pages={245-250},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004042602450250},
isbn={978-989-8565-24-2},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography (ICETE 2012) - SECRYPT
TI - Cryptographic Enforcement of Access Control while Mitigating Key Sharing
SN - 978-989-8565-24-2
IS - 2184-3236
AU - B. Frikken, K.
PY - 2012
SP - 245
EP - 250
DO - 10.5220/0004042602450250
PB - SciTePress