Key Assignment Schemes with Authenticated Encryption, revisited

Authors

  • Jeroen Pijnenburg Royal Holloway, University of London, Egham, United Kingdom
  • Bertram Poettering IBM Research – Zurich, Rüschlikon, Switzerland

DOI:

https://doi.org/10.13154/tosc.v2020.i2.40-67

Keywords:

Cryptographic Access Control, AEAD, Encryptment, Provable Security

Abstract

A popular cryptographic option to implement Hierarchical Access Control in organizations is to combine a key assignment scheme with a symmetric encryption scheme. In brief, key assignment associates with each object in the hierarchy a unique symmetric key, and provides all higher-ranked “authorized” subjects with a method to recover it. This setup allows for encrypting the payloads associated with the objects so that they can be accessed by the authorized and remain inaccessible for the unauthorized. Both key assignment and symmetric encryption have been researched for roughly four decades now, and a plethora of efficient constructions have been the result. Surprisingly, a treatment of the joint primitive (key assignment combined with encryption, as used in practice) in the framework of provable security was conducted only very recently, leading to a publication in ToSC 2018(4). We first carefully revisit this publication. We then argue that there are actually two standard use cases for the combined primitive, which also require individual treatment. We correspondingly propose a fresh set of security models and provably secure constructions for each of them. Perhaps surprisingly, the two constructions call for different symmetric encryption primitives: While standard AEAD is the right tool for the one, we identify a less common tool called Encryptment as best fitting the other.

Downloads

Published

2020-07-24

Issue

Section

Articles

How to Cite

Key Assignment Schemes with Authenticated Encryption, revisited. (2020). IACR Transactions on Symmetric Cryptology, 2020(2), 40-67. https://doi.org/10.13154/tosc.v2020.i2.40-67