Jason Crampton, Rosli Daud and Keith M. Martin (2010) Constructing Key Assignment Schemes from Chain Partitions.
Full text access:
Please contact the Repository Manager for a copy of this item
In considering a problem in access control for scalable multimedia formats, we have developed new methods for constructing a key assignment scheme. Our first contribution is to improve an existing cryptographic access control mechanism for scalable multimedia formats. We then show how our methods can be applied to a chain partition to develop alternative mechanisms for scalable multimedia formats and how these methods can themselves be extended to create a new type of key assignment scheme.
This is a Published version This version's date is: 16/04/2010 This item is peer reviewed
https://repository.royalholloway.ac.uk/items/5c2f4778-a751-9524-7dd9-6f0b609e0699/1/
Deposited by () on 23-Jun-2010 in Royal Holloway Research Online.Last modified on 15-Dec-2010
[1] S.G. Akl and P.D. Taylor. Cryptographic solution to a problem of accesscontrol in a hierarchy. ACM Transactions on Computer Systems,1(3):239–248, 1983.
[2] M.J. Atallah, M. Blanton, N. Fazio, and K.B. Frikken. Dynamic andefficient key management for access hierarchies. ACM Transactions onInformation and System Security, 12(3):1–43, 2009.
[3] M.J. Atallah, M. Blanton, and K.B. Frikken. Key management for nontreeaccess hierarchies. In Proceedings of 11th ACM Symposium on AccessControl Models and Technologies, pages 11–18, 2006.
[4] M.J. Atallah, M. Blanton, and K.B. Frikken. Efficient techniques forrealizing geo-spatial access control. In Proceedings of the 2007 ACMSymposium on Information, Computer and Communications Security,pages 82–92, 2007.
[5] D.E. Bell and L. LaPadula. Secure computer systems: Unified expositionand Multics interpretation. Technical Report MTR-2997, MitreCorporation, Bedford, Massachusetts, 1976.
[6] C. Christopoulos, A. Skodras, and T. Ebrahimi. The JPEG2000 stillimage coding system: An overview. IEEE Transactions on ConsumerElectronics, 46(4):1103–1127, 2000.
[7] J. Crampton, K. Martin, and P. Wild. On key assignment for hierarchicalaccess control. In Proceedings of 19th Computer Security FoundationsWorkshop, pages 98–111, 2006.
[8] B.A. Davey and H.A. Priestley. Introduction to Lattices and Order.Cambridge University Press, Cambridge, United Kingdom, 1990.
[9] D.E. Denning. A lattice model of secure information flow. Communicationsof the ACM, 19(5):236–243, 1976.
[10] R.P. Dilworth. A decomposition theorem for partially ordered sets. Annalsof Mathematics, 51:161–166, 1950.
[11] N. Hashimoto, S. Imaizumi, M. Fujiyoshi, and H. Kiya. Hierarchicalencryption using short encryption keys for scalable access control ofJPEG 2000 coded images. In Proceedings of the 2008 IEEE InternationalConference on Image Processing, pages 3116–3119, 2008.
[12] S. Imaizumi, M. Fujiyoshi, Y. Abe, and H. Kiya. Collusion attackresilienthierarchical encryption of JPEG 2000 codestreams with scalableaccess control. In Proceedings of the 2007 IEEE International Conferenceon Image Processing, volume 2, pages 137 –140, 2007.
[13] S. Imaizumi, O. Watanabe, M. Fujiyoshi, and H. Kiya. Generalizedhierarchical encryption of JPEG 2000 codestreams for access control.In Proceedings of the 2005 IEEE International Conference on ImageProcessing, volume 2, pages 1094–1097, 2005.
[14] J. Katz and Y. Lindell. Introduction to Modern Cryptography. Chapman& Hall/CRC, 2007.
[15] W. Li. Overview of fine granularity scalability in MPEG-4 video standard.IEEE Transactions on Circuits and Systems for Video Technology,11(3):301–317, 2001.
[16] B.B. Zhu, S.M. Feng, and S. Li. An efficient key scheme for layeredaccess control of MPEG-4 FGS video. In Proceedings of the 2004 IEEEInternational Conference on Multimedia and Expo, volume 1, pages 443–446, 2004.