the culprit is not traceable and rekeying the users re-
quires the system to rekey everyone with this key or a
key for a descendant.
A related area is public key traitor tracing (Boneh
and Franklin, 1999). While this appears to solve the
same problem as the current work, there is a crucial
difference. Mainly, these schemes do not take into
account the role hierarchy and the need to derive keys
according to the hierarchy.
Another area of related work is broadcast encryp-
tion (Fiat and Naor, 1994). These problems are sim-
ilar in that they both attempt to give access to con-
tent to a set of users according to an access policy.
However, in order to user broadcast encryption for the
problems considered in this paper the content servers
would need to know the RH and the U2R mapping.
6 CONCLUSIONS
In this paper we introduced a new framework for
cryptographic enforcement of access control. In this
new framework each user has its own key for every
access level, and the content providers use the identity
to encrypt content. This new framework mitigates the
problems posed by key sharing, because this scheme
has built-in traitor tracing and allows revocation with-
out rekeying. These benefits come at the price of al-
lowing anonymous access, but pseudonymous access
is still possible. We give two schemes in this new
framework, one for tree access hierarchies and one
for arbitrary hierarchies. This new framework is an
interesting first step towards mitigating the problems
with cryptographic enforcement of access control.
ACKNOWLEDGEMENTS
The authors would like to thank the anonymous re-
viewers for their comments and useful suggestions.
Portions of this work were supported by Grant CNS-
0915843 from the National Science Foundation.
REFERENCES
Akl, S. and Taylor, P. (1983). Cryptographic solution to a
problem of access control in a hierarchy. ACM Trans-
actions on Computer Systems, 1(3):239–248.
Atallah, M., Blanton, M., and Frikken, K. (2007). Incorpo-
rating temporal capabilities in existing key manage-
ment schemes. In Biskup, J. and Lopez, J., editors,
Computer Security (ESORICS 2007), volume 4734 of
Lecture Notes in Computer Science, pages 515–530.
Springer Berlin / Heidelberg.
Atallah, M. J., Blanton, M., Fazio, N., and Frikken, K. B.
(2009). Dynamic and efficient key management for
access hierarchies. ACM Trans. Inf. Syst. Secur.,
12:18:1–18:43.
Ateniese, G., De Santis, A., Ferrara, A. L., and Masucci, B.
(2006). Provably-secure time-bound hierarchical key
assignment schemes. In Proceedings of the 13th ACM
conference on Computer and communications secu-
rity, CCS ’06, pages 288–297, New York, NY, USA.
ACM.
Baric, N. and Pfitzmann, B. (1997). Collision-free accumu-
lators and fail-stop signature schemes without trees.
In Fumy, W., editor, Advances in Cryptology (EURO-
CRYPT 1997), volume 1233 of Lecture Notes in Com-
puter Science, pages 480–494. Springer Berlin / Hei-
delberg.
Boneh, D. and Franklin, M. (1999). An efficient public
key traitor tracing scheme. In Wiener, M., editor, Ad-
vances in Cryptology (CRYPTO 1999), volume 1666
of Lecture Notes in Computer Science, pages 783–
783. Springer Berlin / Heidelberg.
Crampton, J., Martin, K., and Wild, P. (2006). On key as-
signment for hierarchical access control. In Computer
Security Foundations Workshop, 2006. 19th IEEE.
di Vimercati, S. D. C., Foresti, S., Jajodia, S., Paraboschi,
S., and Samarati, P. (2007). Over-encryption: man-
agement of access control evolution on outsourced
data. In Proceedings of the 33rd international con-
ference on Very large data bases, VLDB ’07, pages
123–134. VLDB Endowment.
Fiat, A. and Naor, M. (1994). Broadcast encryption. In
Stinson, D., editor, Advances in Cryptology CRYPTO
93, volume 773 of Lecture Notes in Computer Science,
pages 480–491. Springer Berlin / Heidelberg.
Sandhu, R. (1987). On some cryptographic solutions for
access control in a tree hierarchy. In Fall Joint Com-
puter Conference on Exploring technology: today and
tomorrow, pages 405–410.
Sandhu, R. (1988). Cryptographic implementation of a tree
hierarchy for access control. Information Processing
Letters, 27(2):95–98.
Santis, A. D., Ferrara, A. L., and Masucci, B. (2008). New
constructions for provably-secure time-bound hierar-
chical key assignment schemes. Theoretical Com-
puter Science, 407(1-3):213 – 230.
Shamir, A. (1985). Identity-based cryptosystems and signa-
ture schemes. In Blakley, G. and Chaum, D., editors,
Advances in Cryptology, volume 196 of Lecture Notes
in Computer Science, pages 47–53. Springer Berlin /
Heidelberg.
SECRYPT2012-InternationalConferenceonSecurityandCryptography
250