Cryptographic enforcement of information flow policies without public information via tree partitions. / Crampton, Jason; Farley, Naomi; Gutin, Gregory; Jones, Mark; Poettering, Bertram.

In: Journal of Computer Security, Vol. 25, No. 6, 24.08.2017, p. 511-535.

Research output: Contribution to journalArticle

Published

Standard

Cryptographic enforcement of information flow policies without public information via tree partitions. / Crampton, Jason; Farley, Naomi; Gutin, Gregory; Jones, Mark; Poettering, Bertram.

In: Journal of Computer Security, Vol. 25, No. 6, 24.08.2017, p. 511-535.

Research output: Contribution to journalArticle

Harvard

APA

Vancouver

Author

BibTeX

@article{f2212f6b051a4d6aa02f970353d8a925,
title = "Cryptographic enforcement of information flow policies without public information via tree partitions",
abstract = "We may enforce an information flow policy by encrypting a protected resource and ensuring that only users authorized by the policy are able to decrypt the resource. In most schemes in the literature that use symmetric cryptographic primitives, each user is assigned a single secret and derives decryption keys using this secret and publicly available information. Recent work has challenged this approach by developing schemes, based on a chain partition of the information flow policy, that do not require public information for key derivation, the trade-off being that a user may need to be assigned more than one secret. In general, many different chain partitions exist for the same policy and, until now, it was not known how to compute an appropriate one.In this paper, we introduce the notion of a tree partition, of which chain partitions are a special case. We show how a tree partition may be used to define a cryptographic enforcement scheme and prove that such schemes can be instantiated in such a way as to preserve the strongest security properties known for cryptographic enforcement schemes. We establish a number of results linking the amount of secret material that needs to be distributed to users with a weighted acyclic graph derived from the tree partition. These results enable us to develop efficient algorithms for deriving tree and chain partitions that minimize the amount of secret material that needs to be distributed.",
author = "Jason Crampton and Naomi Farley and Gregory Gutin and Mark Jones and Bertram Poettering",
year = "2017",
month = aug
day = "24",
doi = "10.3233/JCS-16863",
language = "English",
volume = "25",
pages = "511--535",
journal = "Journal of Computer Security",
issn = "0926-227X",
publisher = "IOS Press",
number = "6",

}

RIS

TY - JOUR

T1 - Cryptographic enforcement of information flow policies without public information via tree partitions

AU - Crampton, Jason

AU - Farley, Naomi

AU - Gutin, Gregory

AU - Jones, Mark

AU - Poettering, Bertram

PY - 2017/8/24

Y1 - 2017/8/24

N2 - We may enforce an information flow policy by encrypting a protected resource and ensuring that only users authorized by the policy are able to decrypt the resource. In most schemes in the literature that use symmetric cryptographic primitives, each user is assigned a single secret and derives decryption keys using this secret and publicly available information. Recent work has challenged this approach by developing schemes, based on a chain partition of the information flow policy, that do not require public information for key derivation, the trade-off being that a user may need to be assigned more than one secret. In general, many different chain partitions exist for the same policy and, until now, it was not known how to compute an appropriate one.In this paper, we introduce the notion of a tree partition, of which chain partitions are a special case. We show how a tree partition may be used to define a cryptographic enforcement scheme and prove that such schemes can be instantiated in such a way as to preserve the strongest security properties known for cryptographic enforcement schemes. We establish a number of results linking the amount of secret material that needs to be distributed to users with a weighted acyclic graph derived from the tree partition. These results enable us to develop efficient algorithms for deriving tree and chain partitions that minimize the amount of secret material that needs to be distributed.

AB - We may enforce an information flow policy by encrypting a protected resource and ensuring that only users authorized by the policy are able to decrypt the resource. In most schemes in the literature that use symmetric cryptographic primitives, each user is assigned a single secret and derives decryption keys using this secret and publicly available information. Recent work has challenged this approach by developing schemes, based on a chain partition of the information flow policy, that do not require public information for key derivation, the trade-off being that a user may need to be assigned more than one secret. In general, many different chain partitions exist for the same policy and, until now, it was not known how to compute an appropriate one.In this paper, we introduce the notion of a tree partition, of which chain partitions are a special case. We show how a tree partition may be used to define a cryptographic enforcement scheme and prove that such schemes can be instantiated in such a way as to preserve the strongest security properties known for cryptographic enforcement schemes. We establish a number of results linking the amount of secret material that needs to be distributed to users with a weighted acyclic graph derived from the tree partition. These results enable us to develop efficient algorithms for deriving tree and chain partitions that minimize the amount of secret material that needs to be distributed.

U2 - 10.3233/JCS-16863

DO - 10.3233/JCS-16863

M3 - Article

VL - 25

SP - 511

EP - 535

JO - Journal of Computer Security

JF - Journal of Computer Security

SN - 0926-227X

IS - 6

ER -