Published in

Springer Verlag, Lecture Notes in Computer Science, p. 330-345

DOI: 10.1007/978-3-319-20810-7_23

Links

Tools

Export citation

Search in Google Scholar

Optimal Constructions for Chain-based Cryptographic Enforcement of Information Flow Policies

Journal article published in 2015 by Jason Crampton, Naomi Farley, Gregory Gutin, Mark Jones
This paper is available in a repository.
This paper is available in a repository.

Full text: Download

Green circle
Preprint: archiving allowed
Green circle
Postprint: archiving allowed
Red circle
Published version: archiving forbidden
Data provided by SHERPA/RoMEO

Abstract

The simple security property in an information flow policy can be enforced by encrypting data objects and distributing an appropriate secret to each user. A user derives a suitable decryption key from the secret and publicly available information. A chain-based enforcement scheme provides an alternative method of cryptographic enforcement that does not require any public information, the trade-off being that a user may require more than one secret. For a given information flow policy, there will be many different possible chain-based enforcement schemes. In this paper, we provide a polynomial-time algorithm for selecting a chain-based scheme which uses the minimum possible number of keys. We also compute the number of secrets that will be required and establish an upper bound on the number of secrets required by any user.