A Key Management Method for Cryptographically Enforced Access Control

Anna Zych, Milan Petkovic, Willem Jonker

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

6 Citations (Scopus)

Abstract

Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the keys stored by authorized users. This approach poses the problem of the distribution of secret keys. In this paper, a key management scheme is presented where each user stores a single key and is capable of efficiently calculating appropriate keys needed to access requested data. The proposed scheme does not require to encrypt the same data (key) multiple times with the keys of different users or groups of users. It is designed especially for the purpose of access control. Thanks to that, the space needed for storing public parameters is significantly reduced. Furthermore, the proposed method supports flexible updates when users access rights change.
Original languageEnglish
Title of host publicationSecurity in information systems
Subtitle of host publicationproceedings of the 5th International Workshop on Security in Information Systems, WOSIS 2007
EditorsEduardo Fernández-Medina, Mariemma I. Yagüe
PublisherINSTICC PRESS
Pages9-22
Number of pages14
ISBN (Print)978-972-8865-96-2
DOIs
Publication statusPublished - Jun 2007
Event5th International Workshop on Security in Information Systems, WoSIS 2007 - Funchal, Portugal
Duration: 12 Jun 200716 Jun 2007
Conference number: 5

Workshop

Workshop5th International Workshop on Security in Information Systems, WoSIS 2007
Abbreviated titleWoSIS
CountryPortugal
CityFunchal
Period12/06/0716/06/07

Fingerprint Dive into the research topics of 'A Key Management Method for Cryptographically Enforced Access Control'. Together they form a unique fingerprint.

  • Cite this

    Zych, A., Petkovic, M., & Jonker, W. (2007). A Key Management Method for Cryptographically Enforced Access Control. In E. Fernández-Medina, & M. I. Yagüe (Eds.), Security in information systems: proceedings of the 5th International Workshop on Security in Information Systems, WOSIS 2007 (pp. 9-22). INSTICC PRESS. https://doi.org/10.5220/0002432300090022