Oblivious Transfer with Hidden Access Control Policies
نویسندگان
چکیده
Consider a database where each record has different access control policies. These policies could be attributes, roles, or rights that the user needs to have in order to access the record. Here we provide a protocol that allows the users to access the database record while: (1) the database does not learn who queries a record; (2) the database does not learn which record is being queried, nor the access control policy of that record; (3) the database does not learn whether a user’s attempt to access a record was successful or not; (4) the user can only obtain a single record per query; (5) the user can only access those records for which she has the correct permissions; (6) the user does not learn any other information about the database structure and the access control policies other than whether he was granted access to the queried record, and if so, the content of the record; and (7) the users’ credentials can be revoked. Our scheme builds on the one by Camenisch, Dubovitskaya and Neven (CCS’09), who consider oblivious transfer with access control when the access control policies are public.
منابع مشابه
Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption
The notion of oblivious transfer with hidden access control policies (HACOT) was recently proposed by Camenisch et al. (Public-Key Cryptography 2011). This primitive allows a user to anonymously query a database where each record is protected by a hidden attribute-based access control policy. At each query, the user either learns the value of a single record if the attributes in his key satisfy...
متن کاملAdaptive Oblivious Transfer with Access Control from Lattice Assumptions
Adaptive oblivious transfer (OT) is a protocol where a sender initially commits to a database {Mi}i=1. Then, a receiver can query the sender up to k times with private indexes ρ1, . . . , ρk so as to obtain Mρ1 , . . . ,Mρk and nothing else. Moreover, for each i ∈ [k], the receiver’s choice ρi may depend on previously obtained messages {Mρj}j<i. Oblivious transfer with access control (OT-AC) is...
متن کاملControlling Access to an Oblivious Database Using Stateful Anonymous Credentials
In this work, we consider the task of allowing a content provider to enforce complex access control policies on oblivious protocols conducted with anonymous users. As our primary application, we show how to construct privacy-preserving databases by combining oblivious transfer with an augmented anonymous credential system. This permits a database operator to restrict which items each user may a...
متن کاملBlind Expressive Ciphertext Policy Attribute Based Encryption for Fine Grained Access Control on the Encrypted Data
Oblivious transfer with access control is a protocol where data in the database server are protected with access control policies and users with credentials satisfying the access policies are allowed to access them, whereas the database server learns nothing about the data accessed by users or about her credentials.Our scheme has the advantages as follows: First, our scheme maintains the privac...
متن کامل