2015
DOI: 10.1007/978-3-319-28166-7_19
|View full text |Cite
|
Sign up to set email alerts
|

Cryptographic Enforcement of Information Flow Policies Without Public Information

Abstract: The enforcement of access control policies using cryptographic primitives has been studied for over 30 years. When symmetric cryptographic primitives are used, each protected resource is encrypted and only authorized users are given the decryption key. Hence, users may require many keys. In most schemes in the literature, keys are derived from a single key explicitly assigned to the user and publicly available information. Recent work has challenged this design by developing schemes that do not require public … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
9
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 8 publications
(11 citation statements)
references
References 16 publications
2
9
0
Order By: Relevance
“…⊓ ⊔ Let (X, ) be an information flow policy and let y, z ∈ X with z < y. Then, following Crampton et al [10], we define…”
Section: Problem Statementmentioning
confidence: 99%
“…⊓ ⊔ Let (X, ) be an information flow policy and let y, z ∈ X with z < y. Then, following Crampton et al [10], we define…”
Section: Problem Statementmentioning
confidence: 99%
“…We design and analyze an efficient algorithm for computing a forest that minimizes the total number of issued secrets. This work generalizes our previous work on tree-based enforcement schemes [16]. In addition, the more general framework enables us to simplify the techniques and formal exposition.…”
Section: Introductionmentioning
confidence: 64%
“…Crampton et al [16] made use of the fact that derivation paths are uniquely defined in trees (as well as in chains) to develop the idea of a tree-based cryptographic enforcement scheme. Their work established that it was possible to compute (in polynomial time) an optimal tree for the information flow policy.…”
Section: Secrets Per Nodementioning
confidence: 99%
See 2 more Smart Citations