Access Control Encryption for Equality, Comparison, and More

被引:31
|
作者
Fuchsbauer, Georg [1 ,2 ]
Gay, Romain [1 ,2 ]
Kowalczyk, Lucas [3 ]
Orlandi, Claudio [4 ]
机构
[1] CNRS, ENS, INRIA, Paris, France
[2] PSL Res Univ, Paris, France
[3] Columbia Univ, New York, NY USA
[4] Aarhus Univ, Aarhus, Denmark
来源
基金
欧洲研究理事会;
关键词
STRUCTURE-PRESERVING SIGNATURES; ASSUMPTIONS;
D O I
10.1007/978-3-662-54388-7_4
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Access Control Encryption (ACE) is a novel paradigm for encryption which allows to control not only what users in the system are allowed to read but also what they are allowed to write. The original work of Damgard et al. [DHO16] introducing this notion left several open questions, in particular whether it is possible to construct ACE schemes with polylogarithmic complexity (in the number of possible identities in the system) from standard cryptographic assumptions. In this work we answer the question in the affirmative by giving (efficient) constructions of ACE for an interesting class of predicates which includes equality, comparison, interval membership, and more. We instantiate our constructions based both on standard pairing assumptions (SXDH) or more efficiently in the generic group model.
引用
收藏
页码:88 / 118
页数:31
相关论文
共 50 条
  • [41] Access to encryption services
    不详
    [J]. JOURNAL OF THE INSTITUTION OF BRITISH TELECOMMUNICATIONS ENGINEERS, 2000, 1 : 7 - 7
  • [42] Access to encryption services
    Anon
    [J]. Journal of the Institution of British Telecommunications Engineers, 2000, 1 (02):
  • [43] More Steps to Equality
    Wright, Gregory
    [J]. NATION, 2014, 299 (1-2) : 34 - 34
  • [44] A Secure Cloud Computing System by Using Encryption and Access Control Model
    Mahmood, Ghassan Sabeeh
    Huang, Dong Jun
    Jaleel, Baidaa Abdulrahman
    [J]. JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2019, 15 (03): : 538 - 549
  • [45] Hierarchical Access Control Scheme of Private Data Based on Attribute Encryption
    Lin, Xi
    Han, Yiliang
    [J]. DATA SCIENCE, PT 1, 2017, 727 : 220 - 230
  • [46] Decentralized Access Control on Data in the Cloud with Fast Encryption and Outsourced Decryption
    De, Sourya Joyee
    Ruj, Sushmita
    [J]. 2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2015,
  • [47] Blockchain Data Privacy Access Control Based on Searchable Attribute Encryption
    Feng, Tao
    Pei, Hongmei
    Ma, Rong
    Tian, Youliang
    Feng, Xiaoqin
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 66 (01): : 871 - 884
  • [48] A Provably Secure Re-encryption-Based Access Control in Hierarchy
    Pareek, Gaurav
    Purushothama, B. R.
    [J]. RECENT FINDINGS IN INTELLIGENT COMPUTING TECHNIQUES, VOL 1, 2019, 707 : 97 - 104
  • [49] Balancing Access Control and Privacy for Data Deduplication via Functional Encryption
    Mi, Bo
    Long, Ping
    Liu, Yang
    Kuang, Fengtian
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2020, 2020
  • [50] Attribute-based Encryption for Access Control Using Elementary Operations
    Crampton, Jason
    Pinto, Alexandre
    [J]. 2014 IEEE 27TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2014, : 125 - 139