Publication

On compression of cryptographic keys

Citations
Altmetric:
Alternative Title
Abstract
Any secured system can be modeled as a capabilitybased access control system in which each user is given a set of secret keys of the resources he is granted access to. In some systems which are sensitive to key storage cost, key derivation is commonly used. With a goal to minimize the maximum key storage per user, key compression based on key linking, that is, deriving one key from another without compromising security, is studied. A lower bound on key storage needed for a general access structure with key derivation is derived. This bound demonstrates the theoretic limit of any systems which do not trade off security and can be treated as a negative result to provide ground for designs with security tradeoff. A concrete, provably secure key linking scheme based on pseudorandom functions is given, along with an algorithm for finding optimal key linking patterns. © 2008 IEEE.
Keywords
Source Title
IEEE International Symposium on Information Theory - Proceedings
Publisher
Series/Report No.
Organizational Units
Organizational Unit
COMPUTER SCIENCE
dept
Rights
Date
2008
DOI
10.1109/ISIT.2008.4595309
Type
Conference Paper
Related Datasets
Related Publications