2016
DOI: 10.1007/978-3-319-47422-9_4
|View full text |Cite
|
Sign up to set email alerts
|

Universally Composable Cryptographic Role-Based Access Control

Abstract: Abstract. In cryptographic access control sensitive data is protected by cryptographic primitives and the desired access structure is enforced through appropriate management of the secret keys. In this paper we study rigorous security definitions for the cryptographic enforcement of Role Based Access Control (RBAC). We propose the first simulationbased security definition within the framework of Universal Composability (UC). Our definition is natural and intuitively appealing, so we expect that our approach wo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 23 publications
0
3
0
Order By: Relevance
“…We recommend the following well-documented examples for using during the studying the UC approach in classwork and homework: universally composable symmetric encryption [26], universally composable undeniable signatures [27], universally composable key management [28], universally composable role-based access control [29]. How to work with such examples?…”
Section: Embedding Universal Composability Frameworkmentioning
confidence: 99%
“…We recommend the following well-documented examples for using during the studying the UC approach in classwork and homework: universally composable symmetric encryption [26], universally composable undeniable signatures [27], universally composable key management [28], universally composable role-based access control [29]. How to work with such examples?…”
Section: Embedding Universal Composability Frameworkmentioning
confidence: 99%
“…NEW SECURITY DEFINITIONS. The results presented in [10] show a gap between gamebased and simulation-based security definitions for cRBAC systems, which raises the following question: Do the existing security definitions appropriately capture the secure enforcement of access control policies?…”
Section: Introductionmentioning
confidence: 99%
“…al. studied security of cRBAC systems in the UC framework [10]. They proposed a UC security definition for such systems and showed that this type of security presents an impossibility result due to the commitment problem.…”
Section: Introductionmentioning
confidence: 99%