Constructing Key Assignment Schemes from Chain Partitions

Jason Crampton, Rosli Daud and Keith M. Martin

(2010)

Jason Crampton, Rosli Daud and Keith M. Martin (2010) Constructing Key Assignment Schemes from Chain Partitions.

Our Full Text Deposits

Full text access:

Please contact the Repository Manager for a copy of this item

Links to Copies of this Item Held Elsewhere


Abstract

In considering a problem in access control for scalable multimedia formats, we have developed new methods for constructing a key assignment scheme. Our first contribution is to improve an existing cryptographic access control mechanism for scalable multimedia formats. We then show how our methods can be applied to a chain partition to develop alternative mechanisms for scalable multimedia formats and how these methods can themselves be extended to create a new type of key assignment scheme.

Information about this Version

This is a Published version
This version's date is: 16/04/2010
This item is peer reviewed

Link to this Version

https://repository.royalholloway.ac.uk/items/5c2f4778-a751-9524-7dd9-6f0b609e0699/1/

Item TypeMonograph (Technical Report)
TitleConstructing Key Assignment Schemes from Chain Partitions
AuthorsCrampton, Jason
Daud, Rosli
Martin, Keith M.
DepartmentsFaculty of Science\Mathematics

Deposited by () on 23-Jun-2010 in Royal Holloway Research Online.Last modified on 15-Dec-2010

Notes

References

[1] S.G. Akl and P.D. Taylor. Cryptographic solution to a problem of access
control in a hierarchy. ACM Transactions on Computer Systems,
1(3):239–248, 1983.

[2] M.J. Atallah, M. Blanton, N. Fazio, and K.B. Frikken. Dynamic and
efficient key management for access hierarchies. ACM Transactions on
Information and System Security, 12(3):1–43, 2009.

[3] M.J. Atallah, M. Blanton, and K.B. Frikken. Key management for nontree
access hierarchies. In Proceedings of 11th ACM Symposium on Access
Control Models and Technologies, pages 11–18, 2006.

[4] M.J. Atallah, M. Blanton, and K.B. Frikken. Efficient techniques for
realizing geo-spatial access control. In Proceedings of the 2007 ACM
Symposium on Information, Computer and Communications Security,
pages 82–92, 2007.

[5] D.E. Bell and L. LaPadula. Secure computer systems: Unified exposition
and Multics interpretation. Technical Report MTR-2997, Mitre
Corporation, Bedford, Massachusetts, 1976.

[6] C. Christopoulos, A. Skodras, and T. Ebrahimi. The JPEG2000 still
image coding system: An overview. IEEE Transactions on Consumer
Electronics, 46(4):1103–1127, 2000.

[7] J. Crampton, K. Martin, and P. Wild. On key assignment for hierarchical
access control. In Proceedings of 19th Computer Security Foundations
Workshop, pages 98–111, 2006.

[8] B.A. Davey and H.A. Priestley. Introduction to Lattices and Order.
Cambridge University Press, Cambridge, United Kingdom, 1990.

[9] D.E. Denning. A lattice model of secure information flow. Communications
of the ACM, 19(5):236–243, 1976.

[10] R.P. Dilworth. A decomposition theorem for partially ordered sets. Annals
of Mathematics, 51:161–166, 1950.

[11] N. Hashimoto, S. Imaizumi, M. Fujiyoshi, and H. Kiya. Hierarchical
encryption using short encryption keys for scalable access control of
JPEG 2000 coded images. In Proceedings of the 2008 IEEE International
Conference on Image Processing, pages 3116–3119, 2008.

[12] S. Imaizumi, M. Fujiyoshi, Y. Abe, and H. Kiya. Collusion attackresilient
hierarchical encryption of JPEG 2000 codestreams with scalable
access control. In Proceedings of the 2007 IEEE International Conference
on Image Processing, volume 2, pages 137 –140, 2007.

[13] S. Imaizumi, O. Watanabe, M. Fujiyoshi, and H. Kiya. Generalized
hierarchical encryption of JPEG 2000 codestreams for access control.
In Proceedings of the 2005 IEEE International Conference on Image
Processing, volume 2, pages 1094–1097, 2005.

[14] J. Katz and Y. Lindell. Introduction to Modern Cryptography. Chapman
& Hall/CRC, 2007.

[15] W. Li. Overview of fine granularity scalability in MPEG-4 video standard.
IEEE Transactions on Circuits and Systems for Video Technology,
11(3):301–317, 2001.

[16] B.B. Zhu, S.M. Feng, and S. Li. An efficient key scheme for layered
access control of MPEG-4 FGS video. In Proceedings of the 2004 IEEE
International Conference on Multimedia and Expo, volume 1, pages 443–
446, 2004.


Details