Figures
Abstract
This work presents a novel hierarchical key assignment mechanism for access control, designed to be computationally lightweight and optimized for digital environments with structured access policies. By leveraging orthogonal projection and distributing a basis to each group, it enables flexible and efficient left-to-right and top-down access structures. The scheme ensures that parent groups can derive the secret keys of their child groups while preventing unauthorized reverse access. It is resilient against collusion attacks and privilege escalation, offering robust key recovery and indistinguishability properties. Moreover, it guarantees strong key indistinguishability under adversarial models and facilitates a secure rekeying process without reliance on a trusted third party. To demonstrate practical efficiency, we provide a full analytical complexity evaluation showing that key derivation requires at most operations, where ni is the dimension of the assigned subspace. For typical deployment parameters used in the experiments, the total key material per user remains compact (
bits), significantly smaller than well-known post-quantum schemes such as Dilithium-5 (38,912 bits). The storage requirement scales linearly with the number of groups (ck + 1 bases for c groups with at most k members), ensuring that even large hierarchies remain lightweight. Our evaluation further shows that selective rekeying affects only the descendants of the modified group, resulting in communication overhead of
bits, where
is the number of affected users and λ is the key length. These results collectively highlight the scheme’s scalability, low storage footprint, and suitability for large access hierarchies.
Citation: Celiktas B, Çelikbilek I, Guzey S, Ozdemir E (2026) Hierarchical secure key assignment scheme. PLoS One 21(2): e0341637. https://doi.org/10.1371/journal.pone.0341637
Editor: Sohail Saif, Maulana Abul Kalam Azad University of Technology West Bengal, INDIA
Received: July 17, 2025; Accepted: January 10, 2026; Published: February 18, 2026
Copyright: © 2026 Celiktas et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Data Availability: All relevant data are within the manuscript and its Supporting information files. https://figshare.com/articles/software/Source_Code_for_the_Hierarchical_Key_Assignment_Scheme_HKAS_/30822809?file=60188627.
Funding: The author(s) received no specific funding for this work.
Competing interests: The authors have declared that no competing interests exist.
Introduction
In the digital realm, data confidentiality is ensured through cryptographic primitives such as symmetric keys or public-key algorithms. Encrypted data can be restored to its original form only by using the secret key utilized for the encryption function. The access control policy for this key should align with the data controller’s policy, which may involve intricate rules and structures, especially in complex organizational environments. Extracting the key usually requires the approval of multiple entities, and a secret sharing algorithm can effectively manage the desired key access control in some cases, as outlined in [1]. However, an access control policy requiring approvals from multiple users, each with a unique classification level assigned by the data controller, may pose practical challenges and limitations when implemented using a secret sharing algorithm. Numerous studies on hierarchical key assignment schemes have been published since Akl and Taylor introduced their hierarchical access control scheme in 1983 [2]. However, our motivation for conducting this research is rooted in the fact that unresolved issues still need to be addressed to develop a practical access mechanism for hierarchical structures.
Various organizations handling mission-critical data are embracing the current trend of transitioning their services to digital platforms. In such scenarios, organizations can choose public or private cloud services to facilitate data flow and adapt access policies to fit the digital environment. However, the use of public clouds raises significant concerns, particularly in sectors like military, healthcare, and banking, where confidentiality and privacy are paramount. Beyond general concerns regarding confidentiality, availability, integrity, reliability, data lock-in, and regulatory compliance, integrating the data controller’s access policy into a digital medium remains a complex and ongoing challenge within the research community [3,4]. Due to the aforementioned concerns, many organizations have been postponing their digitalization plans despite the public cloud deployment model provides many advantages, especially in total time-cost [5].
This study introduces a practical key access policy that securely mirrors the hierarchical access policy of data controllers. By implementing the resulting scheme, concerns regarding the transfer of private data to the public cloud may be mitigated. The proposed scheme introduces a flexible hierarchical key assignment protocol founded on inner product spaces, leveraging the mathematical framework of orthogonal projection (OP). The foundational concepts related to this scheme were previously outlined in a doctoral dissertation [6].
This study centers on the Bell-LaPadula (BLP) hierarchical multilevel lattice-based model, designed to ensure confidentiality within hierarchical organizational structures, particularly in contexts such as government and military organizations. One of the primary objectives of the model is to ensure simple security, where groups with lower classification privileges are unable to access or read objects of a higher classification level. Therefore, the read-down model is adopted for hierarchical access control. Fig 1 depicts a multilevel hierarchical organizational structure, where the number of levels corresponds to the classification tiers established by the data controller.
Many organizations employ hierarchical management mechanisms within their organizational structures. These mechanisms are often established by dividing the organization into functional areas or smaller organizational units/groups, represented as Gi. The data controller defines a security classification level for each Gi in order to access the key/data. It is assumed that only members with higher classification levels can access data of lower classification levels if a parent-child relationship exists.
Since access control is managed by the data controller and maintained on-premises, a cloud storage provider, acting as a service entity, must not gain access to any mission-critical user data. To address this, a scheme is required to enable the secure utilization of public cloud services for diverse purposes. This study presents the initial stage of such a scheme, focusing on resolving the key access control challenges faced by users.
In the subsequent sections, we utilize directed acyclic graphs (DAG), referred to as access graphs, and represented by G(V,E), where V is a finite set of classes (vertices) and E is a set of paired vertices (edges). Let V consists of sets . For example, the graph G(9,8) in Fig 1 is a DAG with nine vertices and eight directed edges. The symbol ≤ denotes a partial order (binary relation - antisymmetric, transitive, and reflexive) on V. Consequently, (V, ≤) forms a partially ordered set (poset). The security classes
, or equivalently the groups Gis, are disjoint. Let x,
, where
indicates two disjoint classes. This relation implies that users in class x and it means that the users in class x can access all the data accessible to users in class y. In other words, Gx ≤ Gy signifies that any user in Gx can access data belonging to Gy, and Gx has a classification level higher than or equal to Gy. Additionally, Gx must be one of the parent classes of Gy. Figs 1 and 2 depict the key access structure of the proposed scheme.
- The root parent G1 has two children (G2, G3).
- Each of these children serves as a parent to other classes:
- – Parent G2 has three children (G4, G5, G6).
– Parent G3 also has three children (G7, G8, G9).
- – Parent G2 has three children (G4, G5, G6).
Each child has only one immediate parent. All parents, except for the root parent G1, also have an immediate parent as well as children. The secret key for each child class can be derived by its parent classes and by the members of that child class. Even if two classes have the same classification level (as shown in Fig 2), if they do not share a parent-child relationship as illustrated in Fig 1, the key of one class cannot be derived by the other. This ensures the integrity and security of the hierarchical access control model.
The application of inner product spaces to the design of key assignment schemes can be traced back to the foundational study [7], in which orthogonal projection methods were introduced within a non-hierarchical framework. In that work, projection-based techniques served a dual purpose: they enabled both authentication and key establishment to be achieved simultaneously, thereby demonstrating the utility of linear algebraic constructs in cryptographic protocol design. Building upon this foundation, the extension of inner product spaces to hierarchical key establishment was first systematically investigated in the corresponding author’s doctoral dissertation. That dissertation provided the initial theoretical framework for adapting projection methods to hierarchical structures, thereby laying the groundwork for more complex access control scenarios.
The present study advances this line of inquiry by refining and modifying the dissertation’s approach, offering what is, to the best of our knowledge, the first explicit and pioneering application of inner product spaces to hierarchical key establishment. This contribution represents a significant departure from earlier non-hierarchical treatments, as it demonstrates how the algebraic properties of inner product spaces can be harnessed to enforce hierarchical relationships among keys in a mathematically rigorous manner. Subsequent research has further developed this trajectory by analyzing projection-based hierarchical key assignment schemes (HKAS) and comparing with other well-known methods. These later works have shown that projection techniques can be systematically integrated into hierarchical access control, thereby confirming the broader applicability of inner product space methods in cryptographic key management [8].
The structure of this paper is as follows: The Literature review section presents a comprehensive literature review on key assignment schemes for hierarchical access control. The Preliminaries section outlines the foundational concepts underlying our proposed scheme, including inner product spaces, Gram-Schmidt (GS) method, and orthogonal projection (OP). The Proposed scheme section details the proposed scheme, covering its core principles, system initialization, key derivation, and dynamic update processes. The Experimental results section showcases the experimental results, including performance evaluations, security analyses, and comparative studies. Finally, The Conclusion and future work section offers a concise summary and conclusion.
Literature review
This section provides a review of the literature on key assignment and access control schemes specifically designed for hierarchical infrastructures.
Several key assignment schemes have been proposed for hierarchical structures, with many of them being based on the Akl and Taylor scheme, [2,9–16] and they are based on a partially ordered set (poset) hierarchy. These schemes do not include features for granting temporary access to users and also overlook the fact that key updates are based on poset hierarchy, which can result in high costs for large hierarchical structures. Furthermore, the work [17] analyzes the Akl-Taylor scheme using the definitions proposed by [18]. It also introduces a method for selecting public parameters that ensure a secure variation of the scheme, resistant to key recovery attacks under the RSA assumption.
The study discusses using a Lucas function-based time-bound property to enhance time and performance efficiency and address key update challenges [19]. These time-bound related schemes can be classified into two categories: the first relies on tamper-proofed machines [20] and the second [19,21] is based on public information. However, tamper-proof machines are costly, unsuitable for cloud environments, and diminish user convenience, whereas public information can be efficiently leveraged due to the cloud’s capability to ensure broad network access. The secret key of lower classification levels is derived using a combination of public information and the user’s own key. Consequently, the amount of public information is a critical factor in evaluating the efficiency of the key assignment scheme. It should be noted that the schemes presented in [19] are not designed to provide access to users for a certain period of time.
The subsequent proposals for hierarchical key assignment schemes all aim to achieve a secure, dynamic, and cost-effective approach. The effectiveness and security of these schemes can be evaluated based on several critical parameters, including:
- The amount of public and private information required: The terms “private and public storage” refer to the amount of information that is allocated to each class in the hierarchical structure for the derivation of secret keys. The allocation of private information to classes is carried out by the data controller to restrict access to only the users of the desired classes. Conversely, the data controller distributes all public information to all classes in accordance with the predefined hierarchical structure.
- Key derivation complexity: This refers to the computational cost or number of operations required for key derivation, which should be kept minimal and manageable.
- Key update complexity/cost due to the changes in the hierarchical structure: This metric pertains to the cost required for updating keys and it should be minimized and manageable. A scheme should enable addition or removal of classes without requiring re-distribution of any private information.
- Collusion (aka collaborative/key recovery-KR) attack resistance: A secure hierarchical key assignment scheme should ensure that the derivation of the secret key of any class is protected against collusion of users in its child classes. This property is referred to key recovery security (KRs) in the literature.
- The key indistinguishability secure (KIs): The secret key should be indistinguishable from a random string of the same length. A scheme that satisfies this property is called KIs and it also satisfies key recovery security, KRs. Note that while a scheme is KIs then it is also KRs, the converse is not necessarily true, as stated in [21].
- Resistance to privilege creep problem: A hierarchical key assignment scheme must ensure that if the classification level of a member U or its membership is changed, the member cannot use their previous privileges during the transition period. This means that the scheme should provide both forward and backward secrecy.
The proposed key management scheme in [2] aims to address the problem of data sharing and multi-group management in hierarchical structures. Users in a communication or computer system are classified into disjoint sets , where the relationship between the classes forms a poset hierarchy. Each group is assigned a security level, and users in a group can access data stored by users in the same or lower security level groups, but not in higher level groups. Although this approach is useful for distributed and secure systems, it has limitations. For example, it does not fully address multi-level security problems, and it cannot be adapted dynamically to the security policy set by the data controller. Another issue is that users can use keys permanently at higher security levels, which requires regular replacement and redistribution of keys and incurs significant storage and communication costs. Moreover, the key derivation is expensive, and the scheme is only KRs according to [21]. With a large number of users, this scheme becomes cost-ineffective due to the large number of keys kept by each user [9]. Additionally, storing public information for each security class requires significant storage [11,16].
The work presented in [9] provides an improved scheme of [2], also known as a canonical assignment, aimed to reduce the storage requirement for public information necessary to control data access within a user group ordered hierarchically, especially if the number of classes is significantly large [19]. However, the storage need is not completely eliminated [16]. Additionally, any user belonging to a group can access the data of lower-level groups since they can derive the keys of lower-level group users, and the scheme is only KIs.
The hierarchical scheme based on symmetric-key cryptography proposed in [10] utilizes a tree structure in which security classes are organized as a rooted tree, exemplifying a partially ordered set (poset) hierarchy. The scheme employs an iterative method based on a one-way function, allowing for efficient computation of input images while making it computationally infeasible to determine pre-images. Using this approach, the key for a child class can be securely derived. A notable innovation of the scheme is its ability to insert new security classes without requiring changes to the keys of existing classes. This is in contrast to previous schemes, such as [2,9], where the insertion of a new security class required changing all keys not associated with the new class, resulting in a substantial burden, particularly for distributed and large infrastructures. Additionally, the key derivation process does not rely on any additional public parameters, simplifying its implementation. However, the scheme has notable drawbacks: the computational overhead during key derivation can become significant, especially when deriving keys for the lowest class that must be generated by the root of the tree. Moreover, the scheme’s efficiency is limited to organizations with fewer than eleven security levels.
The work presented in [11] proposed a method similar to [2], but it employs a bottom-up key derivation policy. Unlike other approaches such as [2,9], this method allows new security classes to be added without altering the keys of existing classes. Furthermore, the public storage requirements for classes are significantly lower than those in [2,9]. Additionally, the scheme demonstrates improved memory efficiency compared to [2].
The works [12,13] proposed schemes utilizing Newton’s method and one-way functions. However, these schemes are highly time-intensive due to the significant computation time required for key generation and derivation. Furthermore, they are vulnerable to collaboration attacks, as highlighted in [14].
As proposed by [15], an optimal heuristic algorithm for key distribution in a tree hierarchy uses an up-bottom design approach. This method efficiently generates and derives keys while minimizing the storage requirements for general parameters. However, similar to the approach in [10], its applicability is limited to tree hierarchies.
In contrast, [16] modified the algorithm proposed in [15] to support poset hierarchies. In this scheme, a user in a parent class can derive the keys for users in child classes using a one-way function and their own cryptographic key. However, the reverse is not permitted, as users in a child class are not authorized to derive the key of a parent class. This design ensures that the scheme satisfies the KRs property.
The approach proposed in [19] employs a time-bound mechanism, derived from [2], to restrict the continuous usage of keys by higher-level users in class C. This scheme allows membership in C for a limited time period. For instance, a user in Cx can derive Ky from Kx at a specific time t only if and
, where t1 and t2 define the valid time interval.
Therefore, encrypted data can only be held by a user for a limited time period. The hierarchical structure in this approach has an optimal bandwidth for broadcasting data to authorized users. Each user can only receive data that has been granted access, and unauthorized users cannot obtain data by listening to the broadcast. Moreover, a user of the parent class can grant privileges to another user to decrypt encrypted data, providing flexibility. Unlike previously proposed key assignment schemes based on poset hierarchy, this approach is not dependent on the number of classes in the hierarchy. However, since users must hold keys to access authorized data for a limited time period, it is not computationally efficient as expected. Although it requires less communication and storage cost, it is computationally inefficient due to the need for costly public key computation and costly computations that occur during implementation [20]. Additionally, it is not KIs if at least three users collaborate then they can access the keys [22].
The work presented in [20] is an improvement over the time-bound key assignment scheme proposed in [19] inspired by [2]. It addresses the performance and implementation issues of the previous scheme by assigning different keys to each user in the hierarchical structure. The scheme employs a tamper-resistant machine that performs simple operations and is not accessible to the controller, ensuring a high level of security. A Trusted Agent (TA) and a secure one-way hash function h are also used in the scheme. The key generation process is economically unfeasible to derive from the public value, and users in child classes cannot derive the keys of users in parent classes, making it KRs. The scheme ensures that no user can derive any key beyond their authorized time period. Performance analysis shows that the proposed scheme is much more efficient than the previous scheme presented in [19]. The scheme requires a low-cost, tamper-resistant machine with small storage and computational complexity. However, the scheme is vulnerable to collusion attacks by three or more users, making it not KRs [22,23].
In [24], various key assignment schemes found in the literature are classified into five categories. Trivial Key Assignment Scheme (TKAS) is simple, but its key update/change process is difficult. Trivial Key Encrypting Key Assignment Scheme (TKEKAS), on the other hand, has an easier key update process and is useful if the key is compromised. In Direct Key Encrypting Key Assignment Scheme (DKEKAS), public data is large, but private storage is minimal, and the key update process is easier. Node-Based Key Assignment Scheme (NBKAS) requires only a single secret value for each user and has an advantage over TKEKAS and DKEKAS since the keys are originally dependent but can be converted to independent keys. For all these schemes, key derivation is a single-step process. In Iterative Key Encrypting Key Assignment Scheme (IKEKAS), key generation and updates are relatively easy, but the key generation process is iterative. The article emphasizes that changes in information flow policies must be accounted for in key assignment schemes and highlights the need for research addressing key update and change challenges. Best practices for any key assignment scheme include minimizing private and public storage requirements, employing computationally efficient methods for key derivation and updates, and ensuring KRs compliance (preventing unauthorized users from deriving keys through collaboration).
A key assignment/access control scheme based on arbitrary access graphs for hierarchical infrastructures was proposed in [18]. This dynamic and efficient scheme utilizes hash functions for deriving child keys from a node’s key and restricts the derivation of child class keys to a certain number of linear bit operations. Each class in the scheme is associated with a unique key, ensuring both KRs and KIs. Each class has a single key associated with it, and the scheme ensures both KRs (resistance to unauthorized key derivation through collaboration) and KIs (resistance to key inference). The scheme’s security is grounded in the use of pseudo-random functions and a secure symmetric key encryption algorithm. The worst-case time complexity for key derivation is O(n), where n represents the number of nodes in the graph. This is more efficient than earlier schemes, as it avoids computationally expensive operations such as interpolating polynomials and modular exponentiation. As demonstrated in [25], an increased amount of public information results in more edges and classes in the graph, while a greater number of classification levels between classes increases the time cost for key derivation. Similar to the scheme proposed in [18], the scheme presented in [26] is well-suited for dynamic structural changes, including class deletions and insertions.
Various key assignment schemes leveraging elliptic-curve cryptography (ECC) have been proposed to address hierarchical access control problem, including those presented in [27–29]. The scheme presented in [27] is slower than both [19,20] due to the principle that the number of access control policies is related to the number of keys and tamper-resistant machines. However, according to [30], this scheme is not KRs. Similarly, the scheme proposed in [28] is not secure against exterior root-finding attack. The method described in [29] is also not KRs [31].
The schemes proposed by [32,33] have shown improved performance when compared to their predecessors. [32] introduced a HKA scheme based on secure symmetric encryption, which offers KIs with more computationally efficient method for key derivation/update when compared to the Atallah et al.’s scheme [18]. Private storage needs are minimal, requiring only one key per class, but an increase in the public storage requirements leads to a larger number of edges and classes in the graph. On the other hand, the scheme proposed in [33] provides efficient computation and storage costs compared to its predecessors.
The schemes proposed in [21] are KIs and KRs, utilizing symmetric encryption and bilinear maps, respectively, and are provably secure. These schemes feature highly efficient key derivation operations, requiring only a single decryption or pairing evaluation, regardless of the number of levels in the hierarchical structure. Updates to the structure involve changes only to public information, while private information remains unaffected. However, as noted in [25], since these schemes depend on both the number of time periods and classes, the private information required can grow significantly with the number of time periods.
The methods described in [25] rely on forward secure pseudorandom generators (FSPRG) and pseudo-random functions (PRF). Key derivation efficiency and the requirement for private information storage are two factors that are weighed against each other. Key derivation efficiency is primarily determined by the longest poset depth, while private information needs depend on the poset width. However, key derivation efficiency is generally better compared to other methods. Furthermore, these methods do not require public storage, which is another advantage.
The approach presented in [34] utilizes linear geometry to arrange users in a hierarchical structure, dividing them into distinct security classes to establish varying access privileges. To derive a security class’s key, both its own public vector and the parent class’s private vector must be employed. The key of the child security class can be directly derived by the parent security class, which eliminates the need for iterative computation and ensures SKIs. The computational cost is manageable, involving vector multiplication and pseudo-random function values. However, this scheme demands greater public storage than others, which is a major disadvantage. Nonetheless, there is a trade-off between storage requirements and computation costs. The approach provides fine-grained control and adaptability to changes/updates in the hierarchy. If modifications occur, the data controller must compute and distribute a new public matrix, which may eventually result in an overall inefficient and intolerable cost. Another drawback is that the matrix must satisfy specific properties to establish a relationship between the hierarchical structure’s number of classes and public information, especially for re-keying.
The method outlined in [35] uses a secret sharing algorithm and polynomial interpolation technique. In this approach, the data controller comprises organizational units, and the key is confidential information unique to each unit in the structure. The scheme caters specifically to dependent organizational units [36]. This means that only users with the necessary authorizations from users with higher or equal privileges can access the key using a directed graph’s topological sorting, which includes self-loops. The time cost of key derivation, as well as the private and public storage requirements, are acceptable. Additionally, since the organizational unit’s secret key does not need to be stored anywhere, the risk of a data breach due to key disclosure is minimized or eliminated.
Recent work by Najafi and Babaie [37] proposes an energy-aware hierarchical key management scheme for IoT, where key server selection and clustering reduce overhead and improve network lifetime. The approach generates shorter keys based on node position and residual energy and, via formal analysis in the ROR model (supported by informal analysis), argues perfect forward secrecy and resistance to impersonation, man-in-the-middle, replay, and key-guessing attacks. However, it assumes reliable position/energy (and neighbor-distance) information for server selection and clustering, and the designated key server remains a critical component whose failure or compromise could disrupt key distribution.
A formal framework incorporating periodic rotation of both secrets and encryption keys into hierarchical key assignment was introduced in recent work [38]. The study proposes an efficient rotation mechanism (KR-HKAS), where the trusted authority updates public information while classes locally evolve their secrets per time period, avoiding setup reinitialization and ongoing redistribution over secure channels. While conceptually strong and backed by provable-security notions, the contribution is primarily theoretical and does not provide implementation-level benchmarks or realistic deployment evidence for system-level overheads. The IHIBE framework integrates IOTA, a lightweight distributed ledger for IoT, with hierarchical identity-based encryption to enable delegated and scalable access control [39]. Its evaluation on AWS and Raspberry Pi 4 confirms scalability across different hierarchy depths and device capabilities. However, the reliance on IOTA interactions introduces high upload latency, limiting the framework’s practicality for real-time or large-scale IoT deployments.
A chaotic map-based key management scheme for hierarchical access control in e-medicine systems was introduced in [40]. The approach uses the lightweight and unpredictable properties of chaotic functions to improve efficiency. However, the security evaluation relies mainly on BAN-logic-based reasoning and attack-oriented arguments rather than a standard provable-security model, and it provides limited empirical evidence on scalability for very large hierarchies.
A recent study introduced the Improved Hierarchical Key Management (IHKM) scheme to enhance security and efficiency in hierarchical WSNs [41]. The scheme combines symmetric and asymmetric cryptography to resist various attacks and improve network lifetime. However, its security evaluation is primarily based on an adversarial model and attack-specific arguments rather than a formal proof framework, and the authors note potential scalability challenges and resource constraints in large networks.
Hierarchical key assignment and access control schemes can be broadly classified into two main categories: direct control and indirect control. Direct schemes, such as those outlined in [25,32,33], require only a single computational step to derive the secret key of a child class. In contrast, indirect schemes,including those presented in [26,28,31,34], derive a child class’s secret key by computing allkeys along the hierarchical path to that class. However, as noted in [42–44], indirect schemes are often insecure and susceptible to various attacks. Additionally, these schemes incur significant overhead costs, as highlighted in [31]. This reveals a gap in the current research landscape, indicating the need for a practical and secure key access mechanism. To address this, we are motivated to propose a cloud-independent hierarchical key assignment scheme based on inner product spaces that ensures both security and efficiency.
A comparison of the principal hierarchical key assignment schemes is provided in Table 1. The table outlines the core methodology, advantages, and known limitations of each construction, and highlights (through the final row) how our proposed inner-product–based scheme addresses these issues.
Preliminaries
Inner product space
Linear algebra has found numerous applications over the past century [45]. Tools such as matrices, eigenvalues, and linear systems [46] are essential components in computational science, particularly in fields like artificial intelligence and machine learning. Most vector spaces are equipped with a well-defined inner product, which serves as a tool to measure the distance between two vectors within the space. Recently, such spaces have been increasingly employed in the security domain [7]. Once the notion of distance is defined within a space, identifying the closest vectors to specific subspaces becomes a computational task. The algorithm proposed in this work leverages this fundamental concept of distance, expressed through the inner product. A brief overview of the inner product and its properties on a vector space Ω is provided below. Following this, the procedure for finding the closest vector in a defined subspace is outlined. Since the process involves constructing an orthonormal basis for the subspace, the Gram-Schmidt (GS) orthogonalization process for generating such a basis is briefly explained. Lastly, we describe the final step, which involves computing the orthogonal projection of a vector onto a defined subspace of Ω.
The vector space Ω equipped with an inner product is referred to as an inner product space. Let W be a subspace of Ω with a basis . The GS method can be applied to transform B into an orthogonal basis
for W. The orthonormal basis,
, for W is then obtained by normalizing each vector in
, resulting in a set of unit vectors.
Remark 1. In practical applications, we employ the Gram-Schmidt (GS) algorithm with a high-precision setting. We also observe that the Modified Gram-Schmidt (MGS) algorithm effectively mitigates numerical instability. However, implementations in real-valued spaces may still be susceptible to floating-point rounding errors, particularly in constrained or cross-platform environments. Furthermore, tests conducted with the standard Gram-Schmidt method indicate that increasing precision to 30 decimal digits or more is sufficient to ensure numerical stability.
Orthogonal Projection (OP)
In real-time applications, it is often necessary to approximate the value of a function f(x) when this value cannot be computed analytically. For instance, Taylor approximation enables the representation of a continuously differentiable function as a linear combination of polynomials. Similarly, Fourier expansion provides a method to express any periodic function as a linear combination of trigonometric functions. The fundamental concept underlying Fourier expansion is the well-established principle of OP.
Assume that f is a vector in Ω. Then we denote the unique orthogonal projection of f onto W by . Basically, OP addresses the problem of finding the closest vector in the subspace W to a given vector f.
A vector h is the nearest vector to f in W if and only if (f–h) is orthogonal to all vectors in W. In practice, determining h for a given f is straightforward if an orthonormal basis for W is available. Specifically, the projection vector of f onto W can be expressed as a linear combination of the elements in the orthonormal basis . Let h represent the closest vector to f; it can be computed using the following formula:
As f–h must be orthogonal to each one of , then
for
and this implies
It is important to note that for any orthonormal basis of W, the OP of f onto W remains the same. Once a basis of W is known, the unique OP can be efficiently computed using the GS orthogonalization process. Fig 3 illustrates the concept of OP in an inner product space, providing a visual representation of how the closest vector h to f is identified within the subspace W.
In other words, h is the nearest vector to f in W if and only if (f–h) is orthogonal to all vectors in W.
A projection of a vector f onto W is unique. This property ensures that, while each user associated with the subspace W may have a distinct basis, all users can compute the same OP of f onto W. This consistency in the computed projection arises from the fundamental nature of OP, which is independent of the specific choice of basis for W.
Remark 2. Let W be a subspace of . If we have an orthonormal basis
for W, the projection of a vector f onto W can be computed directly as:
Thus, when an orthonormal basis is available, there is no need to perform an orthogonalization process, as the projection formula follows naturally.
The proposed scheme
This section presents a comprehensive system model for the proposed hierarchical key assignment scheme, which ensures secure and flexible access control in a structured environment. The model is designed to support a partially ordered set of user groups, where each group is assigned a basis set derived from a higher classification level, adhering to the LRBU policy. The security of the scheme is enforced by leveraging inner product spaces and vector subspaces, allowing efficient key derivation while preventing unauthorized access. The model consists of several key phases: system initialization, hierarchical key assignment, dynamic updates, entropy-aware basis subset selection, key update operations, and key derivation. During initialization, classification levels and basis sets are determined for each group, ensuring hierarchical integrity. The hierarchical key assignment phase distributes group-specific secret keys while maintaining security constraints. The dynamic update phase allows for efficient insertion and deletion of groups without compromising the system’s integrity. Additionally, the key update phase enables seamless re-keying during structural changes while preserving forward and backward secrecy. Finally, the key derivation mechanism ensures that authorized users can compute their own keys as well as those of subordinate groups, while preventing unauthorized key inference. Table 3 also includes to quantitatively evaluate the trade-offs in update complexity and trust re-establishment across the scheme. The following sections provide a detailed breakdown of each phase, outlining the mathematical structure and operational workflow of the proposed model.
basic_rulesBasic rules
Our proposed scheme is based on the following rules.
Rule 1. Let the set of user (access control) groups be . G1 is the most privileged (root) group and
is the number of groups in the hierarchical organization.
Rule 2. Assume that is a partially ordered set (poset). For the groups, Gi and Gj,
means that user of Gi can access own secret key
and also
belonging to Gj whose classification level is lower than Gi. Note that if Gi is one of the parent groups but Gi and Gj are not in the parent-child relationship like in Fig 1, then
should not be obtained by the members of Gi.
Rule 3. Let Ω be an inner product space over a field where
is preferably non-finite field. There is a subspace W1 of V with basis B1 defined for G1. For all other remaining groups in the organization, basis sets
are identified which are all derived from B1. The basis sets Bi for
are designed in comply with the LRBU policy to provide flexibility and efficiency, especially for any dynamic update/change in the structure of the organization.
Rule 4. Let assume that with
is given for poset based access control structure depicted in Fig 1. Note that the vectors
in B1 are linearly independent. The defined basis sets for groups with the same classification (security) level have the same lengths (the number of vectors they contain), which are denoted as follows:
with and
, namely
where we illustrate the key distribution based on the structure given in Fig 1.
For each group, an element in its basis set is selected to be its secret vector. Let the secret vector for G1 be . Then, the basis sets
for
respectively are obtained as follows:
There are C(n1 − 1,n2) distinct subsets of B1 with exactly n2 number of elements and none of these contain the secret vector of G1. Let’s assume the set of these subsets are denoted by .
This means that B2 and B3 are two randomly chosen subsets from set .
Similarly, Bi with are formed as follows:
In this set up, every basis set Bi has at least one secret vector si that is not shared with its children. Therefore, even if all the children collude and combine their private data, they can not generate their parent’s basis set and so they can not derive the parent group’s secret key. On the other hand, any parent group Gi has all the required information to derive its children’s secret keys.
Rule 5. Let’s denote with
. Notice that each of
is a subspace of W1. Similarly,
and
are subspaces of W2 and W3 respectively. The dimensions of the subspaces defined for groups with the same security level are the same, for example;
.
For any ;
- If
, Bj is proper subset of Bi (
) and Wj is subspace of Wi.
- If
,
and Wj is not subspace of Wi.
Rule 6. Any user of Gi can access and
(if
). For example, a user G3 can access the corresponding keys
and also
but any member of
which are lower classification level groups, cannot access
. They are restricted to accessing only their own secret keys.
The formal definition of a hierarchical key assignment scheme is provided below [8,18,25,34].
A hierarchical key assignment scheme for Γ (a set of access graphs) is defined as a pair of two polynomial-time algorithms, Set and Derive, described as follows:
- – The information generation algorithm Set(
) is probabilistic and takes as input
(security parameter) and an access graph
and produces: (1) for each group
;
and
, (2) public information (vectors) (f,g).
Let the output of Set() be symbolized as (B,K,f,g).
- – The key derivation algorithm Derive(
) is deterministic and takes a security parameter
, a graph
, private set Bi, and public informations f,g. The algorithm’s return values are as follows.
(4)
and alsoiff
(
).
System-ready phase
The system preparation and distribution processes are outlined in Algorithm 1 and illustrated in Fig 4, which illustrates the sequential steps involved in the system-ready phase for secure hierarchical key management. The process begins with the definition of classification levels, groups, and the hierarchical structure according to the LBRU policy. A dimension policy is then established, ensuring that each classification level is assigned unique basis sets to maintain security and hierarchical integrity. Following this, a basis is constructed for each group across classification levels. To enhance security, random public vectors (f,g) and user-specific random constants are generated. Using these, a unique basis is constructed for each user by multiplying the group basis with the assigned random constants. Once these steps are completed, the system becomes fully operational and ready for secure hierarchical key management.
System preparation phase.
Algorithm 1 initializes the hierarchical key assignment by defining groups , selecting an inner product space Ω over a field
, and constructing basis sets Bi. The root group G1 is assigned B1, while each child Gi receives
to enforce hierarchical security. Public vectors
enable secure key derivation, ensuring that privileged groups can compute subordinate keys while preventing unauthorized access.
The data controller:
Step 1. Determine all groups for the organization and their positions in the organizational structure based on Rule 1 and Rule 2 as illustrated in Figs 1 and 2.
Step 2. Determine a vector space that may have infinite dimension over a field
, and define an inner product on
. It is worth noting that, although the polynomial space over the real numbers could be considered a suitable candidate, in practical implementations, we consider the finite extension
of
.
Step 3. Identify basis set with
. Determine all basis sets Bi derived from B1 for
according to Rule 3,4,5.
The selected structure allows the data controller to adjust the number of
as the number of groups, c, in the structure changes. The parameters
, used in Algorithm 1, define the dimensions of the hierarchical levels in the key assignment structure.
Alt Step 3. The above rules and key distribution scheme are designed for general use. As mentioned earlier, the orthogonalization process, particularly the application of the Gram-Schmidt method, introduces computational errors. To mitigate this, we have implemented our scheme with a precision of up to 30 decimal digits, which provides sufficient stability in our case.
However, in scenarios where 30-digit precision is unsuitable or where users wish to avoid instability issues, we introduce a modified version of Step 3, referred to as Alternative Step 3:
- Identify an orthonormal basis set
such that
.
- Following rules 3, 4, and 5, determine all basis sets
based on
.
- It is important to note that the basis sets for the other groups remain orthonormal, as they are derived from the initial orthonormal set
.
Distribution phase.
In this phase, the data controller distributes the public and private information to the relevant groups Gi, enabling each member uij to derive the corresponding key or keys in accordance with Rule 6.
Step 1. Select two random vectors such that
which also implies
for
and makes them known to the public.
Step 2. For each user uij in the group Gi select a random constant and set
.
Alt Step 2. This alternative step is designed specifically to avoid high-precision numerical operations. If, during the system initialization phase, an orthonormal basis is constructed for each space, then in this alternative approach, the user uij receives an orthogonal basis set:
If Alternative Step 2 is implemented, all users can disregard the orthogonalization process.
Step 3. Distributes the basis set Bij derived from the basis set Bi to each member of the group Gi based on LRBU policy.
Fig 5 provides an overall workflow diagram of the proposed hierarchical key assignment scheme, combining the System-Ready Phase (steps 1a–1b), the Key Derivation Phase, and the Dynamic Update/Rekeying Phase. This figure visually summarizes the processes formalized in Algorithm 1 and Algorithm 2, offering a complete end-to-end representation of the system.
Steps 1a and 1b are grouped under the System-Ready Phase, followed by key derivation and dynamic rekeying with compromise detection.
Storage and bandwidth benchmarks during key distribution. We provide concrete benchmarks for both the memory usage and the communication bandwidth required during the key distribution phase, which are summarized in Table 2.
During this phase, each user uij receives a scaled basis
where each vector contains m coordinates of λ bits. Thus, the exact memory footprint of the key material assigned to each user is
For the deployment parameters used in our evaluation (m = 32, ni = 10, ):
This compact size demonstrates that the scheme is suitable for resource-constrained devices and low-bandwidth environments.
Bandwidth requirements. Since the distribution phase consists of transmitting the scaled basis to each user, the communication bandwidth equals the size of the transmitted key material:
For the same parameters:
Selective rekeying. If a basis Bi is compromised, only the descendants of that group (denoted users) must be updated. The bandwidth required for rekeying is therefore:
This linear dependency on the number of affected users ensures that rekeying traffic remains minimal, even in large hierarchies.
Key derivation phase
To derive the corresponding secret key, a user uij in the hierarchical structure performs the following tasks (see Algorithm 2):
Step 1. Apply GS orthogonalization operation to its basis Bij, namely computes corresponding orthonormal basis .
Alt Step 1. If users have already received an orthonormal basis as their secret key, they do not need to go through the Gram-Schmidt process. Since the received set is already orthogonal, users only need to normalize each vector. During the key generation step, each vector is multiplied by a constant cij. The normalization step simply removes this constant to obtain the final orthonormal basis.
Step 2. Runs OP to compute h (See Fig 3), which is the closest vector to f in Wi.
The secret key .
Notice that if a member of Gi needs to construct another key, such as , they must possess a basis for the corresponding subspace Wj. Therefore, if a child wants to access its parent’s secret key, it must also have a basis for its parent’s subspace, which cannot be derived or guessed from the child’s own basis. For example, if W1 is a n1-dimensional subspace of
and W2 is a subspace of W1 with n2-dimension (n1 − 1>n2), it is infeasible to reconstruct W1 from W2. In fact, there are uncountably many subspaces of
with n1-dimensions, and knowing only n2 basis elements does not allow the derivation of the remaining elements. For further details, see [7].
Dynamic update phase
Our proposed hierarchical key assignment/access control scheme should enable the adaptation of changes in the access control structure topology over time. Specifically, it allows for the insertion/deletion of groups at any classification level without the requirement to construct new public information (f,g) utilized by any Gi. Additionally, the computational cost and need for private information during the insertion/deletion process are negligible.
Insertion. With our proposed scheme, one or more groups can be added to the hierarchical structure. A group addition to an existing classification level incurs the same computational cost as selecting a random subset from set . Each added group is set as a subgroup of a group with a higher classification level. In addition, one or more groups can be added as children of a group with the lowest classification level. In this case, new classification (security) levels are created for each added group.
Let us continue with adding new groups to different security levels in the access scheme we illustrated earlier in Fig 1 (see Fig 6). In the access scheme shown in Fig 1, there are 3 security levels, which are top secret, secret, and confidential.
In order to add Gu2 to the confidential classification level (as a subgroup of G3) ;
We know that there are
distinct subsets that can be used as the basis set of a group Gu2. The Gu2 basis set is established as one of these randomly selected subsets as follows.
Then Algorithm 1 is executed by the data owner starting from step 12.
Similarly, the groups are recursively included in the access scheme. This means that group Gu1 is added first, then groups Gu3 and Gu4. The basis set for each group is obtained as follows;
Again, Algorithm 1 is executed by the data owner from step 12. Finally, Gu5 is added to the hierarchy. The basis set for the Gu5 is obtained as follows;
The important thing here is that a new classification level can be named as restricted and it is created for group Gu5.
We would like to point out that the structure of the organization can also be preset to create and insert a new classification level. The placeholder values of ni can be used for this purpose.
Deletion. The data owner can delete one or more groups from its organization. If there is no longer a group in a classification level, the classification level can also be deleted. If a parent Gi is deleted from the structure, all children of the deleted parent are recursively linked to a higher parent group and the classification level of each child is updated. New basis sets are selected recursively for all groups whose security level has changed (moved to a higher security level). Old basis sets used by these groups are overridden and not assigned to the newly added groups. However, if the deleted group is at the bottom of the hierarchical structure, there will be no change in the linkage. Basis sets of deleted groups are not used for groups that are newly added to the hierarchy.
Key Update. Each group Gi possesses a unique secret key . If a key is compromised or requires replacement, the data owner re-executes Algorithm 1, assigning new public parameters
. Conversely, if a group’s basis is compromised, the data owner initiates Algorithm 1 from Step 8 for Gi and its descendants. This process updates the relevant basis sets, ensuring continued consistency within the hierarchy.
A summary of the computational and trust-related costs for dynamic operations is provided in Table 3. Unlike schemes that rely on external trusted third parties (TTPs), our design assumes that only the system controller is trusted to perform dynamic updates and key management operations. No additional trusted infrastructure is required.
Experimental results
The proposed hierarchical key access scheme was implemented on a system running Macintosh OS Ventura with a 3.2 GHz 6-Core Intel Core i7 processor and 16 GB 2667 MHz DDR4 memory. The implementation utilized SageMath and Jupyter Notebook for computational tasks and experimentation.
Algorithm 1 constructs hierarchical basis sets, while Algorithm 2 derives hierarchical keys using inner product operations. During the system initialization phase, a random subspace of the universal space is selected. If the system aims to mitigate instability issues in computation, an alternative method for basis generation is employed. Specifically, in this phase, the owner constructs a random orthonormal set.
This can be achieved in several ways. One approach is to select a random basis and apply high-precision arithmetic along with the modified Gram-Schmidt orthogonalization process. However, a more straightforward method involves generating a symmetric matrix A and randomly selecting vectors from distinct eigenspaces. Since the eigenspaces of a symmetric matrix are inherently orthogonal, the choice of A can significantly reduce instability during the orthogonalization process. Once an orthogonal set is determined, constructing an orthonormal set from it becomes trivial.
This alternative approach also reduces the computational burden for each user, as they receive an already orthogonal set. Consequently, during the key derivation phase, users can bypass the Gram-Schmidt orthogonalization process entirely.
The key derivation process for each group Gi is based on Algorithm 3 to perform GS orthogonalization, ensuring numerical stability. To enhance stability during the orthonormalization step, the GS algorithm was employed with precision of 30 decimal digits instead of the classical formulation. This choice significantly improves numerical accuracy, especially when operating in high-dimensional real vector spaces used in the simulation. To improve scalability and computational efficiency, Ω is defined as an inner product space over a field . While infinite dimensional spaces like polynomial spaces are useful in theory in practical implementations we use the well-known real vector space
with
. The vectors f and g should be chosen so that they do not reside in the initial subspace W1. Since the dimension of W1 is selected to be less than m − 1, the probability of randomly selecting two vectors that lie within W1 is negligible. However, if the chosen vectors happen to lie in W1, users without the basis for W1 have no method to verify whether the vectors truly belong to the subspace.
Algorithm 1.
If users might encounter difficulties managing numerical instability while constructing an orthonormal basis, the provided alternative version of Algorithm 1 can be implemented to distribute an orthogonal basis to each user at the beginning.
Algorithm 1. Alternative Algorithm 1.
Input:
1 Follow the initial four steps of Algorithm 1.
System-ready:
2 ,
• Decide method for orthonormal basis construction:
• If high-precision arithmetic is preferred:
• Select a random basis .
• Apply Modified Gram-Schmidt to construct .
• Otherwise:
• Generate a symmetric matrix A in .
• Compute eigenvectors of A.
• Select n eigenvectors corresponding to distinct eigenspaces to form .
3 Follow steps 6 through 13 of Algorithm 1.
Algorithm 2. Key derivation algorithm.
Input:
1 Bij, f, g
Key Derivation:
2 If Bij is not orthogonal
3
4
5 Else
6
7
8
9
Performance analysis
This section analyzes the performance of the proposed scheme by evaluating key metrics, including public and private storage requirements, system readiness, key derivation, and update overheads, and the impact of changes in the hierarchical structure, the compactness of key sizes, the lightweight representation of secrets, the applicability of parameter configurations for practical deployments across varying security levels, and the cost-effectiveness of selective key updates.
Storage cost for public and private information.
Random vectors f,g are the public information for the entire system to derive the corresponding secret keys. All basis sets used for the users are derived from B1. Since , the total number of vectors used by the system is bounded by n1. The basis set B1 is kept secret. Each member uij of the Gi needs its own basis Bij to derive the secret key
. Suppose there are c groups and the maximum number of members in a group is k, so the number of basis is at most ck + 1.
System-ready and key derivation time-cost.
The secret key for a group Gi is derived using the private information Bij and the public information
. The key derivation process may involve the Gram-Schmidt orthogonalization operation unless Alternative Algorithm 1 is implemented. Once a user constructs an orthonormal basis for their subspace, the projection of the public vector f onto the subspace can be efficiently computed using basic inner product operations.
The computational complexity of this process depends on the size of the basis and the inner product defined in the universal space . To evaluate the complexity, we fix the group Gi and its corresponding subspace Wi. Let ni denote the dimension of Wi, i.e.
The complexity of the key derivation procedure (as outlined in Algorithm 2) is analyzed across three primary operations:
- Number of Inner Products I: Computation of inner products for the basis vectors and the public vector.
- Multiplication of Constants M: Scalar multiplications required for orthogonalization and projection steps.
- Division of Constants D: Scalar divisions performed during normalization.
Total number of inner products I
- If Alternative Algorithm 1 is used: 2ni + 1.
- If Algorithm 1 is used:
.
- If Alternative Algorithm 1 is not used, the Gram-Schmidt procedure requires:
(14)
inner products. - The projection operation (see Eq 1) requires computing the coefficients in Eq 2, contributing an additional ni inner products for the ni-dimensional vector space.
- Finally, the last statement in Algorithm 2 necessitates one extra inner product.
The number of M is bounded by
- If the Gram-Schmidt process is required, the number of multiplications is:
- Algorithm 2 requires a total of (2ni + 1) scalar multiplications.
The number of D: ni
- A total of ni scalar divisions are required to normalize the ni basis vectors.
In summary, the complexity of deriving the secret key for a user is at most
, with an upper bound given by:
We should note that the heuristic complexity is when the distribution of the orthonormal basis is chosen in the key generation step.
Key size and lightweight representation.
The lightweight nature of the scheme is reflected in its efficient key generation. The group secret key is derived as the inner product of two vectors, one of which is obtained by OP onto the user’s associated subspace. As the derivation avoids computationally expensive cryptographic primitives (e.g., computing in elliptic curve groups or pairing-based operations), the runtime and storage overhead remain minimal.
The storage requirement for a group key is given by ) bits, where m is the dimension of the universal space (i.e., the number of components), k is the bit-length of each component (e.g., 16 bits) and d is the dimension of the corresponding subspace for any group
. For typical values such as m = 16, k = 32 and d = 6 the secret basis set occupies only 3072 bits (384 B).
For m = 64, k = 64 and d = 5, our scheme has a basis of size 20480 bits, which is smaller than Dilithium-5’s 38,912 bits. Compared to other schemes like RSA-2048 and ECC, our scheme offers acceptable public and private key sizes, while ensuring efficient post-quantum resistance, making it suitable for constrained environments.
We implemented Algorithm 1 and Algorithm 2, using the real vector space over the set of real numbers to evaluate real-time computational costs. The inner product for this implementation was chosen to be the dot product, ensuring simplicity and efficiency in the computations.
Experimental results are presented in the following graphs Figs 7, 8, 9, and 10. The binary access structure (BAS) is a type of hierarchical structure in which each node has exactly two child nodes. The ternary access structure (TAS) is a hierarchical structure where each node has exactly three child nodes. The c denotes the number of groups. The reduced number of vectors in a basis results in lower key-derivation costs, which is a crucial factor.
For larger hierarchical structures, such as c>121 with more than 5 classification levels, storage and computational costs naturally increase but remain within practical applicability limits. As the number of groups increases, the dimension of the space also grows, introducing some additional complexity in the key derivation process. However, as shown in Figs 7, 8, 9, and 10, the proposed scheme efficiently manages this growth. While higher-dimensional spaces require more computation, the O(d2) complexity ensures that the scheme remains scalable and feasible even in deep hierarchies. These results confirm that the proposed scheme can support large-scale access control systems while maintaining efficiency.
Parameterization guidelines for practical deployment.
To provide practical guidelines for deployment, we recommend the following parameter values for achieving a desired flexibility for dynamic update:
- m = 100: The dimension of the real vector space
,
- n1 = 64: Number of basis vectors (dimension) at the top classification level,
- n2 = 32, n3 = 16: Number of basis vectors (dimension) at lower levels,
- k = 60: Bit-length per component (e.g., 60-bit fixed-point representation).
Since the inner product operations scale linearly with m and the total key derivation complexity is , the scheme remains efficient and scalable even in large-scale deployments with 100+ user groups.
Key update.
Each group Gi is assigned a unique secret key . If a key is compromised or needs to be refreshed, the data controller re-executes Algorithm 1 and change the public parameters for Gi and its descendant groups. This targeted rekeying does not affect the global system configuration or public information vectors
, ensuring consistency and minimizing disruption.
In case a basis set is compromised for a group, the update process involves regenerating the basis set for the affected groups and securely redistributing it. Since only a small number of vectors are transmitted per user, the communication overhead scales linearly with the number of updated users and remains lightweight even in large-scale deployments.
From a performance standpoint, this selective rekeying avoids full system reinitialization, reduces computation to localized orthonormal basis generation (Algorithm 3), and eliminates the need for re-deriving unaffected keys. Consequently, the scheme ensures fast recovery from key compromise events with negligible computational and communication cost, preserving overall system efficiency and scalability.
Communication cost of dynamic updates. To estimate the communication cost of dynamic updates, we assume that each key or basis set element is represented as a fixed-length bit string of length λ (e.g., 256-bit AES keys or group elements). When a rekeying operation is required, the system executes Algorithm 1 from Step 8 on the affected group and its ancestors. During recomputation, the number of forwarded messages is proportional to the number of affected users in the subtree update. The total communication cost per update is given by:
where represents the number of affected users. For instance, scenarios such as batched insertions or key compromises within a depth-d subtree may generate multiple update messages per user, depending on the inheritance structure and classification level. However, in practical cases with moderate hierarchy depth (d<10) and reasonable key sizes (
bits), the communication overhead remains manageable.
Trust model extensions. The current scheme follows a centralized trust model, where a system controller manages dynamic updates, key generation, and basis management. While efficient, this model may not be suitable for federated or decentralized systems.
To enhance resilience, the scheme can incorporate distributed basis generation using threshold cryptography (e.g., Shamir or Pedersen secret sharing). In this approach, a minimum of t out of n partially trusted authorities collaboratively generate or update basis sets and corresponding secrets.
By decentralizing key management, this method:
- Reduces vulnerability to single points of compromise.
- Enhances system security and improves fault tolerance.
- Introduces additional coordination and setup overhead.
Careful consideration is required to balance security improvements with the complexity introduced by distributed key management.
Security analysis
This section analyzes the security of the proposed scheme, focusing on key challenges such as collusion resistance, key indistinguishability, and privilege creep prevention. The scheme must prevent adversaries from deriving unauthorized keys, even through collaboration or structural inference. Additionally, it ensures that revoked users or downgraded groups lose access after updates. We formally evaluate its resilience against these threats. To support this evaluation, we introduce formal security models such as key recovery security (KRs) and strong key indistinguishability (SKIs), backed by game-based experiments. Furthermore, we analyze the trust and rekeying mechanisms, provide benchmark-based parameter guidelines aligned with NIST levels, and demonstrate the quantum resistance of the scheme .
Formal resistance to collusion attacks (key recovery security - KRs).
A fundamental security requirement in hierarchical key assignment schemes is collusion resistance, also referred to as KRs in the literature. In a well-structured hierarchy, it must be computationally infeasible for users in child groups or same-level groups to reconstruct the secret key of their parent or peer groups.
Each group Gi is assigned a unique basis Bi in a vector space , ensuring hierarchical security under the LRBU policy. As established in basic_rulesBasic rules section, the hierarchical structure ensures that lower-level groups lack the necessary basis vectors to reconstruct the secret key of a higher-level group. We consider an adversary u that possesses all public information as well as private information of its chosen group members. In other words, adversary u has the combined capabilities of both a static and an adaptive adversary [47]. The objective of adversary u is to obtain the access key for a higher-level class. For simplicity, we assume that u has private information for all child groups of a given group G. The goal is to recover the secret KG of group G. Formally, we analyze the infeasibility of achieving this objective. We first present the formal definition of key recovery security against a static or adaptive adversary, as commonly found in the literature.
Definition 1. Let Γ be a family of graphs corresponding to partially ordered hierarchies, and let be a graph in Γ. Let KeyDistribution be a hierarchical key assignment scheme for Γ, and let g be an adversary targeting a class G. Consider the following experiment, where ρ denotes the security parameter:
Experiment Exp
return kg
The advantage of the attacker g is defined as:
The scheme is considered secure if, for every graph in Γ and every group
, the function
is negligible for any adversary g whose time complexity is polynomial in ρ.
Theorem 1. The hierarchical key distribution KeyDistribution, based on inner product space, provides stronger security than the key recovery security defined above.
Proof: Let be an adversary that possesses all private information of the child groups for a given group G. In this context, let W be the space assigned to G, and let B be a basis for W, where
. For simplicity, we assume that B is an orthonormal basis. The adversary
also has the corresponding basis for the child groups.
The parent group G has a space W whose dimension is greater than the union of all child group subspaces Wi, where each Wi is contained within W. For simplicity, we assume that g possesses all basis elements of B except for b1. We know that:
For the adversary , there are infinitely many possible choices for the vector b1. This is because W is a subspace of a universal space
, and the fact that
is strictly smaller than
implies that there exist infinitely many choices for b1. Specifically, there are infinitely many subspaces of
with the same dimension as W, each containing the vectors
. □
The above theorem establishes that colluding child groups cannot derive their parent’s basis set. Similarly, same-level groups, as they do not possess the complete basis set, are unable to access each other’s keys. Even if multiple adversarial users from child groups pool all their private basis elements, they will always lack at least one critical basis vector necessary to reconstruct B, rendering unauthorized key derivation infeasible. The exclusion of the parent group’s secret vector ensures security. Consequently, our scheme satisfies KRs and remains resistant to collusion attacks.
To complement the hardness-based argument above, we introduce a game-based experiment for KRs in the static setting. Let represent the advantage of a static adversary that corrupts all users in
, acquiring the keys of all subordinate groups. The adversary then attempts to compute the secret basis for W assigned to G. In such a scenario, the adversary may reconstruct the secret key KG. However, by design, the union of all child groups’ bases forms only a strict subspace
of the parent space W, preventing full recovery of the parent’s basis.
An adversary, or multiple collaborating adversaries—seeks to reconstruct their parent’s basis and hence to derive the secret key which is computed as the inner product of two vectors, one of which is the projection to the parent’s space. The game unfolds as follows: the challenger generates the hierarchy and associated keys,
and the adversary is given Bj for Gj and for
. The adversary then produces an output key
. The game returns 1 if
, signifying a successful key recovery. The advantage of the adversary is then defined as:
Given that deriving requires solving the Closest Vector Problem in an Inner Product Space (CVP-IPS) in a higher-dimensional space, while having knowledge of its lower-dimensional subspace. This advantage is negligible due to the following two observation.
Theorem 2. Let W1 be a subspace of the universal space with a dimension t1<m − 2. There exist uncountable many subspaces W of
with dimension t1 + 1 such that
.
Proof: Intuitively, this is easy to visualize when W1 is a one-dimensional subspace. In this case, all vectors in W1 lie along a single straight line. It follows that there are uncountably many distinct straight lines, each of which, when combined with the line spanning W1, forms a two-dimensional plane. □
Theorem 3. Let f be a vector in the subspace W1 of the universal space , where W1 has dimension t1 with t1<m−2. For any a, there exist uncountably many vectors g in any subspace
of dimension t1 + 1 such that
.
Proof: Let f and a be as defined above. Let be a subspace of dimension t1 + 1, and let
be a random vector. Define
Now, consider the vector
in the subspace . It is straightforward to observe that
□
The two theorems above establish that even if all child groups act with hostility, collaborate to share their secrets, and manage to obtain partial information about the secret a, it remains infeasible for them to infer any details about their parent group’s secret. Consequently, our scheme achieves KRs security under the hardness assumption. In other words, the scheme ensures unconditional security, even in scenarios where all child groups collude.
The problem of deriving a parent group’s secret key using only the basis vectors of colluding child groups reduces to solving the projection of a vector in a space without knowing the underlying space. This challenge was previously formalized and studied in [7]. Therefore, the security of our scheme against such attacks is grounded in the computational infeasibility of this problem.
Strong key indistinguishability - SKIs.
To formally establish indistinguishability, we define two security experiments based on game-based definitions commonly employed in hierarchical key assignment schemes. According to this principle, an attacker should be unable to differentiate between the secret key and a random string of the same length.
For an adversary attempting to distinguish between a random string and the secret vector of a group, they must determine whether a given random vector belongs to the subspace associated with that group. However, by Theorem 1 and 2 for an attacker or a member of any child group, identifying a unique linearly independent vector within the parent group’s space is computationally infeasible. This is due to the fact that any element within the universal set, outside the subspace of the child group, has an equal likelihood of being the vector they seek.
Consequently, the probability of correctly identifying a basis vector of the upper group is negligible, rendering the reconstruction of the parent group’s basis computationally infeasible. As a result, our scheme satisfies KIs.
Freire et al. [25] presented the concept of strong key indistinguishability SKIs, which implies security models. In this section, we only perform a formal security analysis for SKIs with a static adversary, as the security models for static and dynamic adversaries are polynomially equivalent [34].
Let’s consider a static adversary StatG, who aims to attack a group and has the ability to
- – corrupt all users in each child group Gj of G.
– getfor each group Gj.
where , with the mappings
and
respectively. Let’s consider the following two experiments [47]:
Experiment Exp
return d.
Experiment Exp
return d.
It is the responsibility of StatG to determine whether the challenge received corresponds to KG or T. The advantage of StatG can be defined as
A scheme is considered secure in the sense of strong key indistinguishability against static adversaries if is negligible for each
. This probability quantifies the likelihood of an adversary distinguishing a secret key from a random string of the same length.
The following theorem establishes that this probability remains negligible, meaning that distinguishing between the actual secret and a random string is independent of any computational problem, even for an adversary possessing all information from child groups.
Theorem 4. Let be an adversary with access to all secrets of the child groups of G. Let d be an arbitrary string of the same length as KG, the secret key constructed by the members of G. Then, determining whether d = KG is computationally infeasible.
Proof: Let W be the subspace associated with group G. The union of all child groups’ spaces forms a strict subspace of W, meaning that even if all child groups collaborate and share their basis elements, they will still lack at least one vector necessary to form a complete basis for W.
Now, let represent the adversary’s subspace, and let
be public vectors. The secret key generated by group G is given by:
According to Theorem 2, the adversary has infinitely many possible choices for spaces of dimension
+ 1, such that
. This implies that even though W has a higher dimension than
, the adversary still faces an infinite number of possibilities when attempting to determine the complete space W.
In other words, the missing basis elements introduce uncertainty, preventing the adversary from reconstructing W completely, even if W maybe only slightly larger than (i.e.,
+ 1). As a result, the adversary has infinitely many choices for
when only knowing
, which in turn leads to infinitely many possibilities for the final secret key KG. □
The resulting keys are derived solely from the knowledge of a basis for the subspace assigned to a group. Theorems 2 and 3 establish that even possessing t–1 basis elements of a space with dimension t provides no information about the space itself, as every possible space of dimension t containing these t–1 elements has an equal probability of being W. Consequently, the probability of accurately determining whether the result of an inner product is obtained using the basis of the correct subspace is negligible. Therefore, the proposed scheme is secure under SKIs.
Resistance to the privilege creep problem.
In a hierarchical access control system, privilege creep occurs when users retain access to groups or resources they should no longer be authorized to access due to structural changes in the organization. To prevent this, a secure key assignment scheme must ensure that revoked users or downgraded groups cannot derive new keys after an update.
- Adversary Model: Consider an adversary
, who was initially a member of group Gi and had access to the corresponding basis set Bi. Due to a structural change—such as a classification level downgrade of Gi or a membership modification (e.g., a user uij moving to another group)—the adversary loses legitimate access to certain group keys. The goal of
is to leverage previously obtained keys, basis sets, or any available public information to derive the new key for Gi or any related groups.
- Security Mechanism: To prevent
from retaining unauthorized access, the system enforces key revocation and re-randomization upon structural updates. Specifically:
- – If Gi undergoes any modification, its basis set Bi is recomputed and updated.
- – Algorithm 1 is executed by the data owner from step 8, recursively updating Gi and all its child groups.
- – The previous basis sets are overridden and permanently revoked, ensuring that they are not transferable to newly added groups.
- – Since the new basis set is randomly re-selected from a high-dimensional vector space, it is computationally infeasible for a revoked user to reconstruct or guess the new basis.
- Security Implication: Even if
retains historical basis sets or previously obtained keys, they lack the necessary information to compute updated keys. Without knowledge of the new secret basis vector, the adversary must solve a randomized linear system, which is an underdetermined problem and thus infeasible in polynomial time. Consequently, our scheme effectively mitigates the privilege creep problem, ensuring that revoked users cannot maintain unauthorized access.
Secure rekeying process and trust model.
The scheme does not rely on an external TTP. The data controller acts as the trust anchor. New basis sets are securely distributed using standard cryptographic channels (e.g., TLS, secure VPN, or hardware-based enclaves). To minimize exposure, ephemeral keys may be used during distribution, and key confirmation protocols (e.g., challenge–response) can be employed to verify correct delivery without disclosing basis content. This approach ensures that revoked users cannot reuse old credentials while keeping system availability intact.
Remark 3. In hierarchical key assignment systems, the detection of compromised group bases must occur at the operational layer. The cryptographic scheme itself lacks the inherent capability to determine whether an assigned basis has been compromised; if such a compromise occurs, an adversary can trivially derive the current key. Indicators of unauthorized activity such as anomalous key derivations or irregular access attempts, can instead be identified through systematic access-log monitoring. Upon confirmation of compromise, the selective rekeying mechanism outlined in Algorithm 2 is initiated. This mechanism recomputes and securely redistributes only the affected subtree, thereby minimizing communication overhead while preserving the integrity and continuity of the remaining hierarchy.
Quantum resistance.
While the previous subsections demonstrate our scheme’s robustness against classical adversaries, it is also essential to evaluate its security posture in the context of quantum-capable threat actors.
Unlike traditional hierarchical key assignment systems that rely on number-theoretic assumptions—such as RSA, ECC, or Diffie–Hellman—which are vulnerable to Shor’s algorithm due to their dependence on integer factorization or discrete logarithms, our construction is inherently immune to such weaknesses. The proposed scheme is built upon randomized subset selection, basis exclusion, and linear operations in high-dimensional vector spaces, which do not exhibit the algebraic structure required for quantum algorithm exploitation. Specifically:
- Shor’s algorithm: Our scheme avoids primitives based on factorization or discrete logarithm assumptions. Since Shor’s algorithm is designed to break such structures efficiently on a quantum computer, it has no applicability to our construction.
- Grover’s algorithm: Although Grover’s algorithm offers a quadratic speedup for brute-force search, the key generation process in our scheme depends on randomly selecting subsets from random subsets within the universal space
. As Theorems 2 and 3 suggest, there are infinitely many choices for the subspaces being searched. Consequently, using brute-force random search for such spaces is not feasible.
- Lattice-based quantum attacks: Our system does not rely on problems such as Learning With Errors (LWE), Closest Vector Problem (CVP), or Shortest Vector Problem (SVP), which form the foundation of lattice-based cryptography. Therefore, it is not susceptible to classical or quantum-accelerated lattice reduction attacks, including BKZ, sieving, or quantum walk algorithms. Although our key recovery security is formally reduced to a CVP-like problem in an inner product space (CVP-IPS), this reduction is used solely for security hardness justification and should not be confused with lattice-based constructions, which exhibit entirely different structural assumptions and are directly targeted by quantum-accelerated lattice reduction attacks.
For applications that require formal post-quantum assurances or compliance with regulatory standards, our design can be optionally hybridized with NIST-recommended post-quantum Key Encapsulation Mechanisms (KEMs), such as CRYSTALS-Kyber. In this hybrid model, the group keys or basis vectors are encrypted using post-quantum secure primitives, providing an additional confidentiality layer without altering the logic or structure of the hierarchical key assignment.
By decoupling its security from number-theoretic and lattice-based assumptions and enabling optional integration with PQC standards, the proposed scheme offers a modular cryptographic framework for deployment in both classical and post-quantum environments.
Parameter recommendations based on NIST security levels.
The security of the scheme depends primarily on three parameters assuming the universal space is :
- the universal space dimension m,
- the dimension ni of Wi, and
- the bit-length λ of each coordinate of the basis elements.
To align the scheme with the NIST PQC security categories (Levels 1, 3, and 5) and the key-strength guidelines defined in NIST SP 800-57, we recommend the following parameter sets:
NIST Level 1 (128-bit classical security). A minimum configuration ensuring 2128 operations for brute-force reconstruction:
NIST Level 3 (192-bit classical security). A stronger configuration preventing any adversary below 2192 operations:
NIST Level 5 (256-bit classical security). Full-strength configuration consistent with AES-256 resistance:
These recommendations ensure that any attempt to reconstruct the protected subspace or distinguish the group key from uniform requires computational effort consistent with the NIST PQC security categories. Importantly, these parameter sets do not alter the hierarchical structure or the operational behavior of the scheme; only the vector dimensions and coordinate sizes are scaled according to the desired security level.
Comparison with other schemes
Table 4 provides a detailed comparison of our key access scheme with several widely recognized schemes. The evaluation considers various parameters critical for assessing the efficiency, security, and practicality of these schemes. The notations used for these parameters are explained at the bottom of Table 4 for clarity and consistency.
Several Akl and Taylor-based schemes, as reviewed in the “Literature review” section [2,9]– [16,19,20], involve computationally expensive key update and derivation processes. As a result, these schemes may not be practical for hierarchical structures with a large number of distinct groups (classes). Additionally, some of these schemes are susceptible to collusion attacks and achieve KRs and KIs only under the RSA assumption or the random exponent assumption. It is worth noting that the provably secure scheme, which is both KRs and KIs, was first introduced by Atallah [18].
In previous works such as [18,32], the amount of public information increases as the number of security classes and edges in the graph increases. Each class only requires a single symmetric key for private storage. However, the time cost of key derivation is directly proportional to the path length between classes, which means that the time-cost increases as the path length increases. These schemes are considered KIs and chosen-plaintext-attack-resistant CPAr from a security standpoint.
According to [17], the Akl and Taylor-based schemes [9,16,19,20] are proven to be KIs only under the RSA assertion (RSAs). However, to satisfy the additional requirements of public storage and key derivation time for KIs, the cost will be several times greater than the bit length l of the key.
The key derivation process in [21] is highly efficient, even for cases where the path length between classes is significantly large. However, the scheme has notable drawbacks in terms of storage requirements. In the first scheme, the public storage requirement depends on both the number of time periods and classes, while in the second scheme, the private storage requirement is determined primarily by the number of time periods.
In [25], a trade-off exists between the need for private information storage and the efficiency of key derivation, which is constrained by the path length h between classes in the hierarchical structure. Additionally, the amount of private information required is determined by the poset width w. A notable contribution of this scheme is that it eliminates the need for public storage, making it a significant advancement in the literature.
The paper [34] proposes a direct access scheme, which is denoted as SKIs, that avoids the need for iterative computation and handles potential hierarchical changes with minimum computations. However, one major drawback of this scheme is its public storage requirement, which is higher than other schemes. The storage need has a linear relation with computational cost. To derive the key for each class, two modular multiplication costs M and one modular addition cost A over Fq need to be performed. Furthermore, each class requires the calculation of 2A and 4M over Fq. Consequently, the computational cost for each class could become prohibitive, rendering the scheme inefficient. Additionally, updating the hierarchy necessitates that the data controller compute and publish a new public matrix, further increasing the operational complexity.
In [36], the storage need for private information is proportional to the number of classes G in a specific organizational unit (OU). However, it can be reduced to just one class, whereas the storage need for public information is zero. Moreover, the time cost for key derivation is quadratic and equal to the square of the employed polynomial degree.
In [8], Celikbilek et al. formally defined the CVP-IPS problem and introduced a generic hierarchical key assignment scheme (HKAS) based on it. This generic scheme was subsequently implemented within a cloud computing environment in [48]. A comprehensive synthesis and detailed exposition of these works are provided in [49]. The scheme’s public storage requirement is two, demonstrating efficient use of publicly accessible resources. The scheme provides strong key indistinguishability SKIs and is based on the CVP-IPS as its security foundation.
On the other hand, our proposed scheme provides a flexible and fine-grained hierarchical direct key assignment and access control mechanism, eliminating the need for other groups or classes during key derivation. Unlike existing hierarchical key assignment schemes, our approach minimizes public storage while maintaining efficient key derivation. The key derivation complexity remains at , where nj represents the dimension of the corresponding vector space. Experimental results confirm that the scheme meets all desirable performance criteria, ensuring efficiency even in larger hierarchies.
The system-ready time cost remains within acceptable limits, with key derivation time scaling directly with the number of classes, making it practical for real-world applications. A key advantage of our scheme over Tang et al. [34] is that it does not require the publication of new public information when hierarchical changes occur, thereby reducing computational overhead and maintaining privacy. Furthermore, our scheme supports dynamic modifications while ensuring that storage and computational costs remain independent of the number of updates.
From a security perspective, we have formally proven that our scheme guarantees strong key indistinguishability security (SKIs), offering superior protection against key inference attacks compared to earlier schemes. Unlike schemes that rely on pseudorandom functions (PRF) or exponentiation-based key derivation, our approach leverages linearly independent chosen vectors (LICV), ensuring resistance to collusion attacks and privilege creep.
Compared to state-of-the-art hierarchical key assignment schemes, our approach achieves a better balance between efficiency and security, reducing public storage requirements, optimizing key derivation complexity, and eliminating costly cryptographic dependencies. The comparative analysis (Table 4) demonstrates that our scheme outperforms traditional methods by minimizing storage, reducing key update costs, and ensuring cryptographic robustness. Consequently, our scheme is highly scalable, computationally efficient, and well-suited for modern access control environments.
Conclusion and future work
This work leverages inner product spaces to design a hierarchical key assignment scheme suitable for various applications, particularly cloud-based environments and large-scale access control systems.
To evaluate our scheme against existing hierarchical key assignment and access control mechanisms, we considered key metrics such as private and public storage requirements, key derivation complexity, key update efficiency, and compliance with security properties including KRs, KIs, SKIs, and resistance to the privilege creep problem. One of the major limitations in hierarchical infrastructures is the excessive storage demand for private and public information, which imposes a significant burden on data controllers handling mission-critical data. Our scheme effectively mitigates this issue by reducing these storage requirements to practical levels while maintaining flexibility and scalability.
A critical advantage of our scheme is its computational efficiency in both key derivation and updates. Unlike traditional schemes that rely on complex cryptographic primitives or require frequent re-keying, our design optimizes key derivation with a reduced number of vectors, leading to lower computational overhead. This efficiency directly translates into improved performance, particularly in large hierarchical structures.
To ensure secure and unpredictable subset selection during hierarchical updates, our scheme utilizes a cryptographically secure pseudorandom number generator (CSPRNG). The generator provides randomness that is used to select a subset of basis vectors, thereby preserving the linear independence and entropy of the updated user space. The CSPRNG is seeded during the selection of random coefficients ci, which are used to construct the vectors for j<n, where
represents the basis of our highest group space.
Compared to state-of-the-art hierarchical key assignment schemes, our approach achieves a better balance between efficiency and security. The comparative analysis (Table 4) demonstrates that our scheme outperforms traditional methods by minimizing storage, reducing key update costs, and ensuring cryptographic robustness.
From a security perspective, the scheme effectively addresses major concerns such as collusion attacks and unauthorized access due to privilege creep. Our approach ensures robust resistance against such threats, providing both forward and backward security, and fully satisfying the KRs, KIs, and SKIs security properties. Furthermore, our security analysis confirms the scheme’s resilience under strong adversarial models, reinforcing its suitability for dynamic and evolving access control environments.
While the security claims are predominantly asymptotic, we emphasize that for practical parameter selections (e.g., vector dimension m = 128), recovering the root basis from compromised user vectors equates to solving an underdetermined system with an infinite search space. For instance, the brute-force effort required to identify a parent’s subspace within a 128-dimensional space is infeasible, as there exist infinitely many potential candidate subspaces. Another important concern is the potential leakage of basis vectors in the event of partial user compromise. Our scheme demonstrates resilience even if multiple user-specific bases Bij are compromised in such scenarios. Each Bij is generated using random coefficients applied to the root basis B1, without disclosing the original vectors or transformation mappings. Consequently, reconstructing B1 from multiple Bij vectors is equivalent to identifying the parent space using only vectors that span a strict subspace of it—an infeasible task regardless of the adversary’s computational power.
We also recognize the cryptographic need for precise key derivation unaffected by numerical imprecision. While the scheme was implemented over a real-valued vector space over for computational simplicity and theoretical clarity, we acknowledge the importance of avoiding floating-point errors in cryptographic systems. Therefore, a promising direction for future work is to transition the scheme to a lattice-based model with discrete vector representations and quantized key outputs, thus enhancing compatibility with practical cryptographic requirements.
Moreover, the current design’s reliance on continuous vector spaces avoids the vulnerabilities associated with certain computationally hard problems found in traditional public key algorithms. However, while integrating discrete inner product structures could offer advantages, such as mitigating any potential instability during operations, it may also introduce vulnerabilities. Specifically, as seen in lattice-based systems, this integration could reduce the scheme’s security to a computationally solvable problem.
In addition to theoretical and efficiency considerations, practical deployment scenarios also merit discussion. The proposed scheme can be integrated with existing PKI and IAM infrastructures. Derived group keys can be used as symmetric session keys (e.g., AES-256) or embedded in certificate structures for secure communication. Such compatibility allows the scheme to serve as a backend key management layer while interfacing with standardized identity and access management systems. Future work may explore formal APIs and wrappers that enable such seamless integration.
Additionally, while the current security proofs rely on well-established game-based arguments (e.g., SKIs), future work may consider formalizing the scheme within the Universal Composability (UC) framework. Doing so would provide stronger composability guarantees and enable seamless integration with cryptographic protocols that require UC-security, such as secure file sharing or key exchange systems.
Furthermore, enhancing fault tolerance by enabling secure regeneration of corrupted user-specific bases Bij, either via deterministic derivation from securely stored seeds or by distributing the root basis B1 through a secret-sharing mechanism, is a promising direction for robust deployment.
Although our security proofs address mathematical and structural resilience, practical deployments of the scheme must consider side-channel resistance. In particular, the GS orthogonalization and inner product computations are susceptible to timing and power-based side-channel attacks due to their operand-sensitive control flow and memory access patterns. To mitigate such threats, implementations should adopt constant-time algorithms, masking techniques, and side-channel-hardened libraries. Future work will explore formal side-channel leakage models and implement the scheme using side-channel resistant primitives to ensure robustness against practical exploitation.
To ensure bit-exact key derivation and eliminate inconsistencies due to machine-dependent rounding behavior, a future variant of the scheme may consider discrete vector spaces, such as integer lattices () or finite fields (
), where exact arithmetic is feasible. This approach not only improves computational determinism but also facilitates verifiable implementations and formal correctness proofs in cryptographic settings.
Overall, the proposed scheme achieves a balanced trade-off between security, efficiency, and scalability, making it a practical and robust solution for hierarchical key assignment across both established infrastructures and emerging application domains, particularly those requiring dynamic structure, scalability, and post-quantum resilience in key management.
Supporting information
S1 Appendix. Source Code for the Hierarchical Key Assignment Scheme.
https://doi.org/10.1371/journal.pone.0341637.s001
(HTML)
References
- 1. Shamir A. How to share a secret. Commun ACM. 1979;22(11):612–3.
- 2. Akl SG, Taylor PD. Cryptographic solution to a problem of access control in a hierarchy. ACM Trans Comput Syst. 1983;1(3):239–48.
- 3.
Kamara S, Lauter K. Cryptographic cloud storage. In: Sion R, Curtmola R, Dietrich S, Kiayias A, Miret JM, Sako K, editors. Financial cryptography and data security. Berlin, Heidelberg: Springer; 2010. p. 136–49.
- 4.
Xin Dong, Jiadi Yu, Yuan Luo, Yingying Chen, Guangtao Xue, Minglu Li. Achieving secure and efficient data collaboration in cloud computing. In: 2013 IEEE/ACM 21st International Symposium on Quality of Service (IWQoS). 2013. p. 1–6. https://doi.org/10.1109/iwqos.2013.6550281
- 5. Zhou L, Varadharajan V, Hitchens M. Achieving secure role-based access control on encrypted data in cloud storage. IEEE TransInformForensic Secur. 2013;8(12):1947–60.
- 6.
Celiktas B. A hierarchical key assignment scheme for access control in cloud computing. Istanbul, Turkey: Istanbul Technical University; 2022.
- 7. Guzey S, Kurt GK, Ozdemir E. Group authentication and key establishment scheme. IEEE Internet Things J. 2024;11(21):35086–99.
- 8. Celikbilek I, Celiktas B, Ozdemir E. A hierarchical key assignment scheme: a unified approach for scalability and efficiency. IEEE Access. 2024;12:70568–80.
- 9. Mackinnon, Taylor, Meijer, Akl. An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Trans Comput. 1985;C–34(9):797–802.
- 10. Sandhu RS. Cryptographic implementation of a tree hierarchy for access control. Information Processing Letters. 1988;27(2):95–8.
- 11. Harn L, Lin H-Y. A cryptographic key generation scheme for multilevel data security. Computers & Security. 1990;9(6):539–46.
- 12. Chang C-C, Hwang R-J, Wu T-C. Cryptographic key assignment scheme for access control in a hierarchy. Information Systems. 1992;17(3):243–7.
- 13. Liaw HT, Wang SJ, Lei CL. A dynamic cryptographic key assignment scheme in a tree structure. Computers & Mathematics with Applications. 1993;25(6):109–14.
- 14. Hwang M-S, Yang W-P, Chang C-C. Modified Chang-Hwang-Wu access control scheme. Electron Lett (UK). 1993;29(24):2095–6.
- 15. Liaw H-T, Lei C-L. An optimal algorithm to assign cryptographic keys in a tree structure for access control. BIT. 1993;33(1):46–56.
- 16. Min-Shiang H. A cryptographic key assignment scheme in a hierarchy for access control. Mathematical and Computer Modelling. 1997;26(2):27–31.
- 17. D’Arco P, De Santis A, Ferrara AL, Masucci B. Variations on a theme by Akl and Taylor: security and tradeoffs. Theoretical Computer Science. 2010;411(1):213–27.
- 18. Atallah MJ, Blanton M, Fazio N, Frikken KB. Dynamic and efficient key management for access hierarchies. ACM Trans Inf Syst Secur. 2009;12(3):1–43.
- 19. Wen-Guey Tzeng. A time-bound cryptographic key assignment scheme for access control in a hierarchy. IEEE Trans Knowl Data Eng. 2002;14(1):182–8.
- 20. Chen H-Y. Efficient time-bound hierarchical key assignment scheme. IEEE Trans Knowl Data Eng. 2004;16(10):1301–4.
- 21. Ateniese G, De Santis A, Ferrara AL, Masucci B. Provably-secure time-bound hierarchical key assignment schemes. J Cryptol. 2010;25(2):243–70.
- 22. Xun Yi, Yiming Ye. Security of tzeng’s time-bound key assignment scheme for access control in a hierarchy. IEEE Trans Knowl Data Eng. 2003;15(4):1054–5.
- 23. Yi X. Security of Chien’s efficient time-bound hierarchical key assignment scheme. IEEE Trans Knowl Data Eng. 2005;17(9):1298–9.
- 24.
Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: 19th IEEE Computer Security Foundations Workshop (CSFW’06); 2006. p. 14–111. http://dx.doi.org/10.1109/CSFW.2006.20
- 25.
Freire ESV, Paterson KG, Poettering B. Simple, efficient and strongly KI-secure hierarchical key assignment schemes. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer; 2013. p. 101–14. https://doi.org/10.1007/978-3-642-36095-4_7
- 26. Shen VRL, Chen T-S. A novel key management scheme based on discrete logarithms and polynomial interpolations. Computers & Security. 2002;21(2):164–71.
- 27. Bertino E, Ning S, Wagstaff SS. An efficient time-bound hierarchical key management scheme for secure broadcasting. IEEE Trans Dependable and Secure Comput. 2008;5(2):65–70.
- 28. Chung YF, Lee HH, Lai F, Chen TS. Access control in user hierarchy based on elliptic curve cryptosystem. Information Sciences. 2008;178(1):230–43.
- 29. Jeng F-G, Wang C-M. An efficient key-management scheme for hierarchical access control based on elliptic curve cryptosystem. Journal of Systems and Software. 2006;79(8):1161–7.
- 30. Sun HM, Wang KH, Chen CM. On the security of an efficient time-bound hierarchical key management scheme. IEEE Transactions on Dependable and Secure Computing. 2009;6(2):159–60. http://dx.doi.org/10.1109/TDSC.2009.15
- 31. Lin Y-L, Hsu C-L. Secure key management scheme for dynamic hierarchical access control based on ECC. Journal of Systems and Software. 2011;84(4):679–85.
- 32. Santis AD, Ferrara AL, Masucci B. Efficient provably-secure hierarchical key assignment schemes. Theoretical Computer Science. 2011;412(41):5684–99.
- 33. Ragab Hassen H, Bettahar H, Bouadbdallah A, Challal Y. An efficient key management scheme for content access control for linear hierarchies. Computer Networks. 2012;56(8):2107–18.
- 34. Tang S, Li X, Huang X, Xiang Y, Xu L. Achieving simple, secure and efficient hierarchical access control in cloud computing. IEEE Trans Comput. 2016;65(7):2325–31.
- 35.
Celiktas B, Celikbilek I, Ozdemir E. A higher level security protocol for cloud computing. In: 2019 4th International Conference on Computer Science and Engineering (UBMK). 2019. p. 97–101. https://doi.org/10.1109/ubmk.2019.8907019
- 36. Celiktas B, Celikbilek I, Ozdemir E. A higher-level security scheme for key access on cloud computing. IEEE Access. 2021;9:107347–59.
- 37. Najafi Z, Babaie S. A lightweight hierarchical key management approach for internet of things. Journal of Information Security and Applications. 2023;75:103485.
- 38.
Cimorelli Belfiore R, De Santis A, Ferrara AL, Masucci B. Hierarchical key assignment schemes with key rotation. In: Proceedings of the 29th ACM Symposium on Access Control Models and Technologies. 2024. p. 171–82. https://doi.org/10.1145/3649158.3657037
- 39. Purnama H, Mambo M. IHIBE: a hierarchical and delegated access control mechanism for IoT environments. Sensors. 2024;24(3):979.
- 40. Lee T-F, Chang I-P, Wang J-G, Chen Y-C, Tsai S-T, Chen R-Y. Extended chaotic map-based key management for hierarchical access control in e-medicine systems. Peer-to-Peer Netw Appl. 2024;17(2):858–70.
- 41. Jain K, Singh A. IHKM: an improved hierarchical key management scheme for wireless sensor network. Telecommun Syst. 2024;87(1):151–66.
- 42. Das AK, Paul NR, Tripathy L. Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem. Information Sciences. 2012;209:80–92.
- 43. Hsu C-L, Wu T-S. Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy. Computers & Security. 2003;22(5):453–6.
- 44. Zhong S, Lin T. A comment on the Chen-Chung scheme for hierarchical access control. Computers & Security. 2003;22(5):450–2.
- 45.
Page L, Brin S, Motwani R, Winograd T. The PageRank Citation Ranking: Bringing Order to the Web. Stanford InfoLab. 1999. p. 1999–66. http://ilpubs.stanford.edu:8090/422/
- 46.
Abadi M, Barham P, Chen J, Chen Z, Davis A, Dean J, et al. TensorFlow: a system for large-scale machine learning. In: 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16). Savannah, GA: USENIX Association; 2016. p. 265–83. https://www.usenix.org/conference/osdi16/technical-sessions/presentation/abadi
- 47. Castiglione A, De Santis A, Masucci B. Key indistinguishability versus strong key indistinguishability for hierarchical key assignment schemes. IEEE Trans Dependable and Secure Comput. 2016;13(4):451–60.
- 48.
Celikbilek I, Celiktas B, Ozdemir E. Implementing lightweight, dynamic hierarchical key assignment scheme for cloud computing. In: 2024 28th International Conference on Information Technology (IT). 2024. p. 1–5. https://doi.org/10.1109/it61232.2024.10475744
- 49.
Celikbilek I. A hierarchical key assignment scheme: a unified approach for scalability and efficiency, with a specialized implementation in cloud computing. Istanbul, Turkey: Istanbul Technical University; 2024.