Proceedings of the 16th ACM Conference on Computer and Communications Security 2009
DOI: 10.1145/1653662.1653679
|View full text |Cite
|
Sign up to set email alerts
|

Oblivious transfer with access control

Abstract: We present a protocol for anonymous access to a database where the different records have different access control permissions. These permissions could be attributes, roles, or rights that the user needs to have in order to access the record. Our protocol offers maximal security guarantees for both the database and the user, namely (1) only authorized users can access the record; (2) the database provider does not learn which record the user accesses; and (3) the database provider does not learn which attribut… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
120
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 101 publications
(120 citation statements)
references
References 37 publications
0
120
0
Order By: Relevance
“…Camenisch et al [2] propose an ideal functionality F OTAC for oblivious transfer with access control (OTAC).…”
Section: Oblivious Transfer With Access Controlmentioning
confidence: 99%
See 4 more Smart Citations
“…Camenisch et al [2] propose an ideal functionality F OTAC for oblivious transfer with access control (OTAC).…”
Section: Oblivious Transfer With Access Controlmentioning
confidence: 99%
“…As a concrete example, we show how to modify the OTAC protocol by Camenisch et al [2] so that it can handle multiple issuers. At setup, each of the issuers I run the protocol ISetup described in Figure 2 in [2] in order to compute a private key sk I = x I and a public key pk I = (g 1 , h 0 , h 1 , h 2 , u, v, w, g t , h t , y I ) to compute and verify signatures.…”
Section: Applications Of the New Ideal Functionality F R Iotacmentioning
confidence: 99%
See 3 more Smart Citations