Methods of encrypting monotonic access structures
نویسندگان
چکیده
منابع مشابه
Methods of encrypting monotonic access structures Jakub
We will present some ideas about sharing a secret in a monotonic access structure. We show the relations which occur between the method of encrypting a monotonic access structure with the use of basis sets or maximal unprivileged sets, and that based on a logical formula (used by Benaloh and Leichter in [1]). We will also give some facts connected with the problem of security, including the asp...
متن کاملMethods of encrypting monotonic access structures
We will present some ideas about sharing a secret in a monotonic access structure. We show the relations which occur between the method of encrypting a monotonic access structure with the use of basis sets or maximal unprivileged sets, and that based on a logical formula (used by Benaloh and Leichter in [1]). We will also give some facts connected with the problem of security, including the asp...
متن کاملAttribute-Based Encryption with Non-Monotonic Access Structures
We construct an Attribute-Based Encryption (ABE) scheme that allows a user’s private key to be expressed in terms of any access formula over attributes. Previous ABE schemes were limited to expressing only monotonic access structures. We provide a proof of security for our scheme based on the Decisional Bilinear Diffie-Hellman (BDH) assumption. Furthermore, the performance of our new scheme com...
متن کاملNon - Monotonic Transformation of Access
The concept of transformation of access rights was recently introduced in the literature by Sandhu. It has been previously shown that monotonic transformations unify a number of diverse access control mechanisms such as ampliication, copy ags, separation of duties and synergistic authorization. In this paper we demonstrate the importance and expressive power of non-monotonic transformations. A ...
متن کاملNon-monotonic transformation of access rights
The concept of transformation of access rights was recently introduced in the literature by Sandhu. It has been previously shown that monotonic transformations unify a number of diverse access control mechanisms such as ampli cation, copy ags, separation of duties and synergistic authorization. In this paper we demonstrate the importance and expressive power of nonmonotonic transformations. A f...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Annales UMCS, Informatica
سال: 2011
ISSN: 2083-3628,1732-1360
DOI: 10.2478/v10065-011-0011-x