Secure Key-Updating for Lazy Revocation
نویسندگان
چکیده
We consider the problem of efficient key management and user revocation in cryptographic file systems that allow shared access to files. A performanceefficient solution to user revocation in such systems is lazy revocation, a method that delays the re-encryption of a file until the next write to that file. We formalize the notion of key-updating schemes for lazy revocation, an abstraction to manage cryptographic keys in file systems with lazy revocation, and give a security definition for such schemes. We give two composition methods that combine two secure key-updating schemes into a new secure scheme that permits a larger number of user revocations. We prove the security of two slightly modified existing constructions and propose a novel binary tree construction that is also provably secure in our model. Finally, we give a systematic analysis of the computational and communication complexity of the three constructions and show that the novel construction improves the previously known constructions.
منابع مشابه
Title Consideration of Experimental Evaluationabout Encrypted Replica Update Process
The secure storage systems adopting the encrypt-on-disk scheme, in which files are stored in cipher for efficient data transmission, need to re-encrypt files with new cryptographic keys when a revocation occurs. There are two re-encryption methods, namely active revocation in which the re-encryption is immediately performed and lazy revocation in which the re-encryption is delayed until the fil...
متن کاملK2C: Cryptographic Cloud Storage with Lazy Revocation and Anonymous Access
Security and privacy concerns hinder the adoption of cloud storage and computing in sensitive environments. We present a user-centric privacypreserving cryptographic access control protocol called K2C (Key To Cloud) that enables end-users to securely store, share, and manage their sensitive data in an untrusted cloud storage anonymously. K2C is scalable and supports the lazy revocation. It can ...
متن کاملRHIBE: Constructing Revocable Hierarchical ID-Based Encryption from HIBE
Up to now, there was very little work on studying the revocation problem in existing hierarchical ID-based encryption (HIBE) systems. Certainly, all existing HIBE systems may inherit the revocation method suggested by Boneh and Franklin to revoke illegal or expired users, in which non-revoked users must periodically update their private keys using secure channels by contacting their ancestors i...
متن کاملKURCS: Key Updating for Removing & replacement of Compromised Sensor Nodes from Wireless Sensor Networks
An energy efficient key management scheme is an important aspect to ensure secure services in resource constrained Wireless Sensor Networks (WSNs). There are two parts of key management scheme, i.e. key distribution and key revocation. Key distribution is the task to manage the key in such a way that if two or more sensors want to communicate with each other for the purpose of sharing the data ...
متن کاملKey Regression: Enabling Efficient Key Distribution for Secure Distributed Storage
The Plutus file system introduced the notion of key rotation as a means to derive a sequence of temporallyrelated keys from the most recent key. In this paper we show that, despite natural intuition to the contrary, key rotation schemes cannot generically be used to key other cryptographic objects; in fact, keying an encryption scheme with the output of a key rotation scheme can yield a composi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005