Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

University of Massachusetts Amherst

2006

Hash chain

Articles 1 - 1 of 1

Full-Text Articles in Entire DC Network

Key Regression: Enabling Efficient Key Distribution For Secure Distributed Storage, Kevin Fu, Seny Kamara, Tadayoshi Kohno Jan 2006

Key Regression: Enabling Efficient Key Distribution For Secure Distributed Storage, Kevin Fu, Seny Kamara, Tadayoshi Kohno

Computer Science Department Faculty Publication Series

The Plutus file system introduced the notion of key rotation as a means to derive a sequence of temporally-related keys from the most recent key. In this paper we show that, despite natural intuition to the contrary, key rotation schemes cannot generically be used to key other crypto- graphic objects; in fact, keying an encryption scheme with the output of a key rotation scheme can yield a composite system that is insecure. To address these shortcomings, we introduce a new cryptographic object called a key regression scheme, and we propose three constructions that are provably secure under standard cryptographic assumptions. …