Browse by author
Lookup NU author(s): Roberta Cimorelli BelfioreORCiD
Full text for this publication is not currently held within this repository. Alternative links are provided below where available.
Hierarchical structures are frequently used to manage access to sensitive data in various contexts, ranging from organizational settings to IoT networks.A Hierarchical Key Assignment Scheme (HKAS) is designed to cryptographically enforce access control in hierarchical structures. It operates by assigning secrets and encryption keys to a set of classes within a partially ordered hierarchy. This approach ensures that the secret of a higher-level class can be used to efficiently derive keys for all classes positioned at a lower level in the hierarchy.In this paper, we introduce a novel cryptographic primitive that we name HKAS with Key Rotation (KR-HKAS). This extension enhances the current HKAS framework by enabling a provably secure mechanism for periodically rotating both encryption keys and secrets, without necessitating a complete setup reset. This proactive approach effectively mitigates the risk of security breaches due to compromised cryptographic material, aligning with the best security practice.
Author(s): Cimorelli Belfiore R, De Santis A, Ferrara AL, Masucci B
Publication type: Conference Proceedings (inc. Abstract)
Publication status: Published
Conference Name: 29th ACM Symposium on Access Control Models and Technologies (SACMAT 2024)
Year of Conference: 2024
Pages: 171-182
Print publication date: 25/06/2024
Online publication date: 25/06/2024
Acceptance date: 28/03/2024
Publisher: ACM
URL: https://doi.org/10.1145/3649158.3657037
DOI: 10.1145/3649158.3657037
Library holdings: Search Newcastle University Library for this item
Series Title: Proceedings of the 29th ACM Symposium on Access Control Models and Technologies
ISBN: 9798400704918