Methods of encrypting monotonic access structures

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Methods of encrypting monotonic access structures Jakub

We will present some ideas about sharing a secret in a monotonic access structure. We show the relations which occur between the method of encrypting a monotonic access structure with the use of basis sets or maximal unprivileged sets, and that based on a logical formula (used by Benaloh and Leichter in [1]). We will also give some facts connected with the problem of security, including the asp...

متن کامل

Methods of encrypting monotonic access structures

We will present some ideas about sharing a secret in a monotonic access structure. We show the relations which occur between the method of encrypting a monotonic access structure with the use of basis sets or maximal unprivileged sets, and that based on a logical formula (used by Benaloh and Leichter in [1]). We will also give some facts connected with the problem of security, including the asp...

متن کامل

Attribute-Based Encryption with Non-Monotonic Access Structures

We construct an Attribute-Based Encryption (ABE) scheme that allows a user’s private key to be expressed in terms of any access formula over attributes. Previous ABE schemes were limited to expressing only monotonic access structures. We provide a proof of security for our scheme based on the Decisional Bilinear Diffie-Hellman (BDH) assumption. Furthermore, the performance of our new scheme com...

متن کامل

Non - Monotonic Transformation of Access

The concept of transformation of access rights was recently introduced in the literature by Sandhu. It has been previously shown that monotonic transformations unify a number of diverse access control mechanisms such as ampliication, copy ags, separation of duties and synergistic authorization. In this paper we demonstrate the importance and expressive power of non-monotonic transformations. A ...

متن کامل

Non-monotonic transformation of access rights

The concept of transformation of access rights was recently introduced in the literature by Sandhu. It has been previously shown that monotonic transformations unify a number of diverse access control mechanisms such as ampli cation, copy ags, separation of duties and synergistic authorization. In this paper we demonstrate the importance and expressive power of nonmonotonic transformations. A f...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Annales UMCS, Informatica

سال: 2011

ISSN: 2083-3628,1732-1360

DOI: 10.2478/v10065-011-0011-x