Please use this identifier to cite or link to this item:
Title: On compression of cryptographic keys
Authors: Chan, A.C.-F. 
Issue Date: 2008
Citation: Chan, A.C.-F. (2008). On compression of cryptographic keys. IEEE International Symposium on Information Theory - Proceedings : 1853-1857. ScholarBank@NUS Repository.
Abstract: Any secured system can be modeled as a capabilitybased access control system in which each user is given a set of secret keys of the resources he is granted access to. In some systems which are sensitive to key storage cost, key derivation is commonly used. With a goal to minimize the maximum key storage per user, key compression based on key linking, that is, deriving one key from another without compromising security, is studied. A lower bound on key storage needed for a general access structure with key derivation is derived. This bound demonstrates the theoretic limit of any systems which do not trade off security and can be treated as a negative result to provide ground for designs with security tradeoff. A concrete, provably secure key linking scheme based on pseudorandom functions is given, along with an algorithm for finding optimal key linking patterns. © 2008 IEEE.
Source Title: IEEE International Symposium on Information Theory - Proceedings
ISBN: 9781424422579
DOI: 10.1109/ISIT.2008.4595309
Appears in Collections:Staff Publications

Show full item record
Files in This Item:
There are no files associated with this item.


checked on Feb 21, 2019


checked on Feb 4, 2019

Page view(s)

checked on Jan 13, 2019

Google ScholarTM



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.