Optimal Constructions for Chain-Based Cryptographic Enforcement of Information Flow Policies

The simple security property in an information flow policy can be enforced by encrypting data objects and distributing an appropriate secret to each user. A user derives a suitable decryption key from the secret and publicly available information. A chain-based enforcement scheme provides an alterna...

Full description

Saved in:
Bibliographic Details
Published inData and Applications Security and Privacy XXIX Vol. 9149; pp. 330 - 345
Main Authors Crampton, Jason, Farley, Naomi, Gutin, Gregory, Jones, Mark
Format Book Chapter
LanguageEnglish
Published Switzerland Springer International Publishing AG 2015
Springer International Publishing
SeriesLecture Notes in Computer Science
Subjects
Online AccessGet full text
ISBN3319208098
9783319208091
ISSN0302-9743
1611-3349
1611-3349
DOI10.1007/978-3-319-20810-7_23

Cover

Abstract The simple security property in an information flow policy can be enforced by encrypting data objects and distributing an appropriate secret to each user. A user derives a suitable decryption key from the secret and publicly available information. A chain-based enforcement scheme provides an alternative method of cryptographic enforcement that does not require any public information, the trade-off being that a user may require more than one secret. For a given information flow policy, there will be many different possible chain-based enforcement schemes. In this paper, we provide a polynomial-time algorithm for selecting a chain-based scheme which uses the minimum possible number of secrets. We also compute the number of secrets that will be required and establish an upper bound on the number of secrets required by any user.
AbstractList The simple security property in an information flow policy can be enforced by encrypting data objects and distributing an appropriate secret to each user. A user derives a suitable decryption key from the secret and publicly available information. A chain-based enforcement scheme provides an alternative method of cryptographic enforcement that does not require any public information, the trade-off being that a user may require more than one secret. For a given information flow policy, there will be many different possible chain-based enforcement schemes. In this paper, we provide a polynomial-time algorithm for selecting a chain-based scheme which uses the minimum possible number of secrets. We also compute the number of secrets that will be required and establish an upper bound on the number of secrets required by any user.
Author Farley, Naomi
Gutin, Gregory
Crampton, Jason
Jones, Mark
Author_xml – sequence: 1
  givenname: Jason
  surname: Crampton
  fullname: Crampton, Jason
  email: jason.crampton@rhul.ac.uk
  organization: Royal Holloway, University of London, London, UK
– sequence: 2
  givenname: Naomi
  surname: Farley
  fullname: Farley, Naomi
  organization: Royal Holloway, University of London, London, UK
– sequence: 3
  givenname: Gregory
  surname: Gutin
  fullname: Gutin, Gregory
  organization: Royal Holloway, University of London, London, UK
– sequence: 4
  givenname: Mark
  surname: Jones
  fullname: Jones, Mark
  organization: Royal Holloway, University of London, London, UK
BookMark eNqNkctu1DAUQA0UxLT0D1j4BwzXvo4fS4haqFSpLGCHZDkepxPIxMHOqJq_r9NB3cLqPo-le3xOzqY0RULec_jAAfRHqw1DhtwyAYYD007gC3KOtfPU4C_JhivOGaK0r54HYM0Z2QCCYFZLfEM2lgujUDXwllyW8gsAeNMYaXBDft7Ny7D3I23TVJZ8CMtQE9qnTNudHyb22Ze4pW0-zku6z37eDYFeTXUe4j5OC009vVnLvV9Jej2mB_otjUMYYnlHXvd-LPHyb7wgP66vvrdf2e3dl5v20y3boTILs0b0UvnQmyBE0_RdJ1W0AWynOHiBW41K9ci11F5u_RZV7LSuhwIXovMeL0hzevcwzf744MfRzblelY-Og1tduurSoauC3JM6t7qsnDhxpa5P9zG7LqXf5V-QPEFzTn8OsSwurlSoMrIfw87PS8zFKWE02sYJyx2i-F-s_osGqZ6xR6UBlsU
ContentType Book Chapter
Copyright IFIP International Federation for Information Processing 2015
Copyright_xml – notice: IFIP International Federation for Information Processing 2015
DBID FFUUA
ABOKW
UNPAY
DEWEY 005.8
DOI 10.1007/978-3-319-20810-7_23
DatabaseName ProQuest Ebook Central - Book Chapters - Demo use only
Unpaywall for CDI: Monographs and Miscellaneous Content
Unpaywall
DatabaseTitleList
Database_xml – sequence: 1
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 3319208101
9783319208107
EISSN 1611-3349
Editor Samarati, Pierangela
Editor_xml – sequence: 1
  fullname: Samarati, Pierangela
EndPage 345
ExternalDocumentID oai:HAL:hal-01745832v1
EBC6287395_291_332
EBC5587046_291_332
GroupedDBID 0D6
0DA
38.
AABBV
AAGZE
AAZAK
AAZUS
ABBVZ
ABFTD
ABMNI
ACKNT
ACRRC
AEDXK
AEJLV
AEKFX
AETDV
AEZAY
ALMA_UNASSIGNED_HOLDINGS
APFYR
AZZ
BBABE
CZZ
FFUUA
I4C
IEZ
IY-
LDH
SBO
SFQCF
TMQGW
TPJZQ
TSXQS
TWXRB
Z7R
Z7S
Z7U
Z7X
Z7Y
Z7Z
Z81
Z83
Z84
Z85
Z88
-DT
-GH
-~X
1SB
29L
2HA
2HV
5QI
875
AASHB
ACGFS
ADCXD
AEFIE
EJD
F5P
FEDTE
HVGLF
LAS
P2P
RNI
RSU
SVGTG
VI1
~02
ABOKW
UNPAY
ID FETCH-LOGICAL-h368t-982f46acf8c2255fbb46e9c09b610a23d7366f31747a4dad36eb770800122baa3
IEDL.DBID UNPAY
ISBN 3319208098
9783319208091
ISSN 0302-9743
1611-3349
IngestDate Sun Oct 26 03:08:59 EDT 2025
Wed Sep 17 04:00:58 EDT 2025
Thu May 29 01:00:16 EDT 2025
Wed May 28 23:42:57 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
LCCallNum QA76.9.A25QA76.9.D3Q
Language English
License cc-by
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-h368t-982f46acf8c2255fbb46e9c09b610a23d7366f31747a4dad36eb770800122baa3
OCLC 912863650
OpenAccessLink https://proxy.k.utb.cz/login?url=https://inria.hal.science/hal-01745832
PQID EBC5587046_291_332
PageCount 16
ParticipantIDs unpaywall_primary_10_1007_978_3_319_20810_7_23
springer_books_10_1007_978_3_319_20810_7_23
proquest_ebookcentralchapters_6287395_291_332
proquest_ebookcentralchapters_5587046_291_332
PublicationCentury 2000
PublicationDate 2015
PublicationDateYYYYMMDD 2015-01-01
PublicationDate_xml – year: 2015
  text: 2015
PublicationDecade 2010
PublicationPlace Switzerland
PublicationPlace_xml – name: Switzerland
– name: Cham
PublicationSeriesSubtitle Information Systems and Applications, incl. Internet/Web, and HCI
PublicationSeriesTitle Lecture Notes in Computer Science
PublicationSeriesTitleAlternate Lect.Notes Computer
PublicationSubtitle 29th Annual IFIP WG 11. 3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, Proceedings
PublicationTitle Data and Applications Security and Privacy XXIX
PublicationYear 2015
Publisher Springer International Publishing AG
Springer International Publishing
Publisher_xml – name: Springer International Publishing AG
– name: Springer International Publishing
RelatedPersons Kleinberg, Jon M.
Mattern, Friedemann
Naor, Moni
Mitchell, John C.
Terzopoulos, Demetri
Steffen, Bernhard
Pandu Rangan, C.
Kanade, Takeo
Kittler, Josef
Weikum, Gerhard
Hutchison, David
Tygar, Doug
RelatedPersons_xml – sequence: 1
  givenname: David
  surname: Hutchison
  fullname: Hutchison, David
  organization: Dept. Computer Sciences, Lancaster University, Lancaster, United Kingdom
– sequence: 2
  givenname: Takeo
  surname: Kanade
  fullname: Kanade, Takeo
  organization: Robotics Institute, Carnegie Mellon University, Pittsburgh, USA
– sequence: 3
  givenname: Josef
  surname: Kittler
  fullname: Kittler, Josef
  organization: Fac. Engineering & Physical Sciences, University of Surrey, Guildford, United Kingdom
– sequence: 4
  givenname: Jon M.
  surname: Kleinberg
  fullname: Kleinberg, Jon M.
  organization: Cornell University, Ithaca, USA
– sequence: 5
  givenname: Friedemann
  surname: Mattern
  fullname: Mattern, Friedemann
  organization: ETH Zürich, Zürich, Switzerland
– sequence: 6
  givenname: John C.
  surname: Mitchell
  fullname: Mitchell, John C.
  organization: Stanford University Dept. Computer Science, Stanford, USA
– sequence: 7
  givenname: Moni
  surname: Naor
  fullname: Naor, Moni
  organization: Computer Science, Weizmann Institute of Science, Rehovot, Israel
– sequence: 8
  givenname: C.
  surname: Pandu Rangan
  fullname: Pandu Rangan, C.
  organization: Indian Institute of Technology Madras, Chennai, India
– sequence: 9
  givenname: Bernhard
  surname: Steffen
  fullname: Steffen, Bernhard
  organization: Technical University of Dortmund, Dortmund, Germany
– sequence: 10
  givenname: Demetri
  surname: Terzopoulos
  fullname: Terzopoulos, Demetri
  organization: University of California, Los Angeles Dept. Computer Science, Los Angeles, USA
– sequence: 11
  givenname: Doug
  surname: Tygar
  fullname: Tygar, Doug
  organization: Management & Systems (SIMS), University of California, Berkeley Dept. Computer Science & Informatio, Berkeley, USA
– sequence: 12
  givenname: Gerhard
  surname: Weikum
  fullname: Weikum, Gerhard
  organization: Max Planck Institute for Informatics, Saarbrücken, Germany
SSID ssj0001558483
ssj0002792
Score 1.7698581
Snippet The simple security property in an information flow policy can be enforced by encrypting data objects and distributing an appropriate secret to each user. A...
SourceID unpaywall
springer
proquest
SourceType Open Access Repository
Publisher
StartPage 330
SubjectTerms Computer security
Cryptographic Primitive
Hasse Diagram
Information architecture
Minimum Cost Flow
Policy Decision Point
Public Information
Title Optimal Constructions for Chain-Based Cryptographic Enforcement of Information Flow Policies
URI http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=5587046&ppg=332
http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=6287395&ppg=332
http://link.springer.com/10.1007/978-3-319-20810-7_23
https://inria.hal.science/hal-01745832
UnpaywallVersion submittedVersion
Volume 9149
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NSwMxEA3SHkQPfqOikoM3Sa1JNrs5ammVotWDlQpCSNIEi3VbbIvUX-9kP7R4ULztIYGQmSRvdua9QeiYU5d41ofbz8Yx4YAQ4MzFjjARWJReOJ8FijcdcdXl7V7UKwpkMy5MCvteewbcWbwAp_AN8W4c8ntw1VZFBJi7gqrdzt35Y54ioEQWlfQiaPIxLhc4cnn6P1B1KLx-dRKr0JloAU1-JUBX0PIsHev5ux4OF96Y1hq6LFeXl5a81GZTU7MfP4Qb_17-OloNDAYcqAWwaxtoyaWbaK3s34CL47yFnm7hvnjVQxy6dpY6shMMMDbMHaTkAp64Pm68zcfTXNl6YHEz8Jds9lMRjzwu6ExhJm4NR-84ExqG8HsbdVvN-8YVKbotkGcmkimRCfVcaOsTC2c88sZw4aStSwMIS1OwJxMCLAfxh-Z93WfCmTgOgPOMUqM120GVdJS6XYQBAvg6S-rW-zgoqAURwMhE0grHpeHJHiLl_qssJ1wUotp8XyYqiuAa4UJReaYYo3-OFxD3MRl9jz8pjarC8IkqxZnBGxRT4A0q8wYVvGEP1b7srsa5xsevE_b_O-EAVcCI7hDgy9Qcoep5s339cFT48CeUquuj
linkProvider Unpaywall
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEA7SHkQPvrGikoM3yVqTbHZz1NIqgo-DBQUhJGmC4rottkXqr3eyj1o8KN72kEDITJJvdub7BqEjTl3q2QBuP5skhANCgDOXOMJEYFF64XwRKF7fiMs-v3qIH6oC2YILk8O-R8-AO6sX4AS-Id5NQn4PrtqmiAFzN1Czf3N39limCCiRVSW9CJp8jMsFjlyZ_g9UHQqvX5skKnQmWkCT8wToClqe5iM9-9BZtvDG9NbQRb26srTkNZpOTGQ_fwg3_r38dbQaGAw4UAtg1zbQkss30VrdvwFXx3kLPd3CffGmMxy6dtY6smMMMDbMfcnJOTxxA9x5n40mpbL1i8XdwF-yxU9FPPS4ojOFmbiXDT9wITQM4fc26ve6951LUnVbIM9MpBMiU-q50NanFs547I3hwknblgYQlqZgTyYEWA7iD80HesCEM0kSAOcppUZrtoMa-TB3uwgDBPBtlrat90lQUAsigLGJpRWOS8PTFiL1_qsiJ1wVotpyX8YqjuEa4UJReaoYo3-OFxD3MRl_jz-ujarC8LGqxZnBGxRT4A2q8AYVvKGFornd1ajU-Ph1wt5_J-yjBhjRHQB8mZjDyne_AD926g4
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Data+and+Applications+Security+and+Privacy+XXIX&rft.atitle=Optimal+Constructions+for+Chain-Based+Cryptographic+Enforcement+of+Information+Flow+Policies&rft.date=2015-01-01&rft.pub=Springer+International+Publishing+AG&rft.isbn=9783319208091&rft.volume=9149&rft_id=info:doi/10.1007%2F978-3-319-20810-7_23&rft.externalDBID=332&rft.externalDocID=EBC6287395_291_332
thumbnail_s http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F5587046-l.jpg
http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F6287395-l.jpg