2012
DOI: 10.1007/978-3-642-29963-6_8
|View full text |Cite
|
Sign up to set email alerts
|

Hiding the Policy in Cryptographic Access Control

Abstract: Abstract. Recently, cryptographic access control has received a lot of attention, mainly due to the availability of efficient Attribute-Based Encryption (ABE) schemes. ABE allows to get rid of a trusted reference monitor by enforcing access rules in a cryptographic way. However, ABE has a privacy problem: The access policies are sent in clear along with the ciphertexts. Further generalizing the idea of policy-hiding in cryptographic access control, we introduce policy anonymity where -similar to the well-under… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
20
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(20 citation statements)
references
References 22 publications
(39 reference statements)
0
20
0
Order By: Relevance
“…This makes the whole scheme not usable for a dynamic scenario. In [23], the authors proposed a similar scheme while also avoiding the disclosure of the AC policy itself, deemed to be sensitive metadata. Still, run-time modifications of the policy were not addressed.…”
Section: Related Workmentioning
confidence: 99%
“…This makes the whole scheme not usable for a dynamic scenario. In [23], the authors proposed a similar scheme while also avoiding the disclosure of the AC policy itself, deemed to be sensitive metadata. Still, run-time modifications of the policy were not addressed.…”
Section: Related Workmentioning
confidence: 99%
“…The work of [32] tried to protect subscription privacy in a publish/subscribe system. The problem of protecting publication privacy was considered in the work reported in [14,29,31]. They did not consider supporting access control capabilities.…”
Section: Related Workmentioning
confidence: 99%
“…Clients delegated their authorization functions to the home brokers and the target domain's security management servers. Although it addressed the access control issue in publish/subscribe middlewares, such overdelegation in some degree violated the security requirements of clients controlling their events' accessing [13,14]. In the work of [13,15], event encryption-based schemes were proposed to avoid the delegation of access control.…”
Section: Introductionmentioning
confidence: 99%
“…Müller et al . explored the expression of access policy. The monotonic syntax tree was proposed in which all inner nodes were labeled with either ∨ or ∧ and the leaves represented either Boolean variables or the constant values ⊥.…”
Section: Related Workmentioning
confidence: 99%