On Key Assignment for Hierarchical Access Control. / Crampton, Jason; Martin, Keith M.; Wild, Peter.

Proceedings of 19th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, 2006. p. 98-111.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Published

Abstract

A key assignment scheme is a cryptographic technique for implementing an information flow policy, sometimes known as hierarchical access control. All the research to date on key assignment schemes has focused on particular encryption techniques rather than an analysis of what features are required of such a scheme. To remedy this we propose a family of generic key assignment schemes and compare their respective advantages. We note that every scheme in the literature is simply an instance of one of our generic schemes. We then conduct an analysis of the Akl-Taylor scheme and propose a number of improvements. We also demonstrate that many of the criticisms that have been made of this scheme in respect of key udpates are unfounded. Finally, exploiting the deeper understanding we have acquired of key assignment schemes, we introduce a technique for exploiting the respective advantages of different schemes.
Original languageEnglish
Title of host publicationProceedings of 19th IEEE Computer Security Foundations Workshop
PublisherIEEE Computer Society Press
Pages98-111
Number of pages14
DOIs
Publication statusPublished - 2006
This open access research output is licenced under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License.

ID: 1275461