Time-storage trade-offs for cryptographically-enforced access control

  • Authors:
  • Jason Crampton

  • Affiliations:
  • Royal Holloway, University of London

  • Venue:
  • ESORICS'11 Proceedings of the 16th European conference on Research in computer security
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Certain classes of authorization policies can be represented as a directed graph and enforced using cryptographic techniques. Such techniques typically rely on the authorized user deriving a suitable decryption key using a secret value and public information. Hence, it is important to find enforcement schemes for which little public information is required and key derivation is efficient. These parameters are related to the number of edges and the distance between nodes in the graph associated with the authorization policy. In this paper we consider ways in which two particular types of authorization graph can be rewritten so that the number of edges and the greatest distance between any two nodes are reduced, thereby providing the basis for more efficient cryptographic enforcement.