Lazy Revocation in Cryptographic File Systems

  • Authors:
  • Michael Backes;Alina Oprea

  • Affiliations:
  • IBM Zurich Research Laboratory, Switzerland;Carnegie Mellon University, USA

  • Venue:
  • SISW '05 Proceedings of the Third IEEE International Security in Storage Workshop
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

A crucial element of distributed cryptographic file systems are key management solutions that allow for flexible but secure data sharing. We consider efficient key management schemes for cryptographic file systems using lazy revocation. We give rigorous security definitions for three cryptographic schemes used in such systems, namely symmetric encryption, message-authentication codes and signature schemes. Additionally, we provide generic constructions for symmetric encryption and message-authentication codes with lazy revocation using key-updating schemes for lazy revocation, which have been introduced recently. We also give a construction of signature schemes with lazy revocation from identity-based signatures. Finally, we describe how our constructions improve the key rotation mechanism in the Plutus file system