Gradual Release: Unifying Declassification, Encryption and Key Release Policies
- 1 May 2007
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- Vol. 3233 (10816011) , 207-221
- https://doi.org/10.1109/sp.2007.22
Abstract
Information security has a challenge to address: enabling information-flow controls with expressive information release (or declassification) policies. Existing approaches tend to address some aspects of information release, exposing the other aspects for possible attacks. It is striking that these approaches fall into two mostly separate categories: revelation-based (as in information purchase, aggregate computation, moves in a game, etc.) and encryption-based declassification (as in sending encrypted secrets over an untrusted network, storing passwords, etc.). This paper introduces gradual release, a policy that unifies declassification, encryption, and key release policies. We model an attacker's knowledge by the sets of possible secret inputs as functions of publicly observable outputs. The essence of gradual release is that this knowledge must remain constant between releases. Gradual release turns out to be a powerful foundation for release policies, which we demonstrate by formally connecting revelation-based and encryption-based declassification. Furthermore, we show that gradual release can be provably enforced by security types and effects.Keywords
This publication has 24 references indexed in Scilit:
- Secrecy Despite Compromise: Types, Cryptography, and the Pi-CalculusPublished by Springer Nature ,2005
- Type-based distributed access controlPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Language-based information-flow securityIEEE Journal on Selected Areas in Communications, 2003
- Practical Mental Poker Without a TTP Based on Homomorphic EncryptionPublished by Springer Nature ,2003
- Verifying secrets and relative secrecyPublished by Association for Computing Machinery (ACM) ,2000
- Secrecy by typing in security protocolsJournal of the ACM, 1999
- Probabilistic encryptionJournal of Computer and System Sciences, 1984
- On the security of public key protocolsIEEE Transactions on Information Theory, 1983
- Mental PokerPublished by Springer Nature ,1981
- Certification of programs for secure information flowCommunications of the ACM, 1977