Cross-Domain Attribute-Based Access Control Encryption
نویسندگان
چکیده
Logic access control enforces who can read and write data; the enforcement is typically performed by a fully trusted entity. At TCC 2016, Damgård et al. proposed Access Control Encryption (ACE) schemes where predicate function decides whether or not users (decrypt) (encrypt) data, while message secrecy users’ anonymity are preserved against malicious parties. Subsequently, several ACE constructions with an arbitrary identity-based policy have been proposed, but they huge ciphertext key sizes and/or rely on indistinguishability obfuscation. IEEE S&P 2021, Wang Chow Cross-Domain scheme constant-size policy; generators separated into two distinct parties, called Sender Authority Receiver Authority. In this paper, we improve over their work novel construction that provides more expressive based attributes rather than identities, security of which relies standard assumptions. Our generic combines Structure-Preserving Signatures, Non-Interactive Zero-Knowledge proofs, Re-randomizable Ciphertext-Policy Attribute-Based schemes. Moreover, propose efficient in ciphertexts encryption decryption keys constant thus independent number receivers attributes. experiments demonstrate only our system flexible, it also results shorter (reduced from about 100 to 47 bytes) 1400 1047).
منابع مشابه
Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption
The notion of oblivious transfer with hidden access control policies (HACOT) was recently proposed by Camenisch et al. (Public-Key Cryptography 2011). This primitive allows a user to anonymously query a database where each record is protected by a hidden attribute-based access control policy. At each query, the user either learns the value of a single record if the attributes in his key satisfy...
متن کاملA2BE: Accountable Attribute-Based Encryption for Abuse Free Access Control
As a recently proposed public key primitive, attribute-based encryption (ABE) (including Ciphertext-policy ABE (CP-ABE) and Key-policy ABE (KP-ABE)) is a highly promising tool for secure fine-grained access control. For the purpose of secure access control, there is, however, still one critical functionality missing in the existing ABE schemes, which is the prevention of key abuse. In particula...
متن کاملTime domain attribute based encryption for big data access control in cloud environment
Due to high volume, variety and velocity of big data, organizations apprehend to store these huge data on the cloud environment, because of its scalability and processing power services in terms of pay as you use. Due to the security demand of data in terms of storage and access structure, data owner cannot store data on cloud in plain text format and hence has to define the encryption algorith...
متن کاملCiphertext-Policy Hierarchical Attribute-based Encryption for Fine-Grained Access Control of Encryption Data
In the ciphertext-policy attribute based encryption (CPABE) scheme, a private key holder is related with a set of attributes while the data is encrypted under an access structure defined by the data provider. In most proposed schemes, the characteristics of the attributes are treated as same level. While in the real world circumstance, the attributes are always in the different levels. In this ...
متن کاملAttribute-Based Oblivious Access Control
In an attribute-based system (ABS), users are identified by various attributes, instead of their identities. Since its seminal introduction, the attribute-based mechanism has attracted a lot of attention. However, current ABS schemes have a number of drawbacks: (i) the communication cost is linear in the number of the required attributes; (ii) the computation cost is linear in the number of the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Lecture Notes in Computer Science
سال: 2021
ISSN: ['1611-3349', '0302-9743']
DOI: https://doi.org/10.1007/978-3-030-92548-2_1