Matches in SemOpenAlex for { <https://semopenalex.org/work/W2154996206> ?p ?o ?g. }
- W2154996206 abstract "Outsourcing data storage reduces the cost of ownership. However, once data is stored on a remote server, users lose control over their sensitive data. There are two approaches to control the access to outsourced data. The first approach assumes that the outsourcee is fully trusted. This approach is also referred to as server mediated access control and works as follows: whenever a user wants to access the stored data, the user has to provide credentials to the server. If the credentials are valid and satisfy the access control policy, the user is allowed to access the stored data. However, fully trusting the server can be dangerous since if the server gets hacked, all users data would be readable by hackers. The second approach reduces the trust on the server and assumes that the server is honest-but-curious: the server is honest in the sense that it stores the data correctly and makes the data available to users, and the server is curious in the sense that it attempts to extract knowledge from the stored data. This approach is also referred as cryptographically enforced access control because it relies on encryption techniques to enforce an access control policy. The main idea of this approach is to map an access control policy into an encryption key, and then to encrypt the data under the encryption key such that only authorized users who possess a decryption key can access the data in clear. Even if the server gets hacked, user data are secure since the data are encrypted. In this thesis we focus on the second approach and propose new encryption schemes for enforcing access control policies with significant advantages over existing ones. In particular, we push the limits of three cryptographic primitives: proxy re-encryption, attribute-based encryption and public-key encryption. Our contributions can be summarized as follows: 1.We propose a proxy re-encryption scheme which enables the delegator to provide a fine-grained access control policy. Proxy re-encryption is a cryptographic primitive developed to delegate the decryption right from one party (the delegator) to another (the delegatee). In our scheme, the delegator can categorize messages into different types and delegate the decryption right of each type to the delegatee through a proxy. 2.We propose two ciphertext-policy attribute-based encryption schemes which are more efficient and at least as expressive as the existing state-of-the-art schemes. In ciphertext-policy attribute-based encryption the data is encrypted under an access control policy defined over attributes. A user can decrypt the ciphertext only if the attribute set of her secret key satisfies the access control policy of the ciphertext. 3.We propose a ciphertext-policy attribute-based encryption scheme in which the secret keys of dishonest or compromised users are revoked. 4.We propose a ciphertext-policy attribute-based encryption scheme that allows users to update the access control policy of the ciphertext without decrypting it. 5.We propose a public-key encryption scheme that allows the secret key holder to delegate to the server the power to search her ciphertexts for possible malware" @default.
- W2154996206 created "2016-06-24" @default.
- W2154996206 creator A5019652256 @default.
- W2154996206 date "2011-07-11" @default.
- W2154996206 modified "2023-09-28" @default.
- W2154996206 title "Ctyptographically enforced distributed data access control" @default.
- W2154996206 cites W126735607 @default.
- W2154996206 cites W1489237398 @default.
- W2154996206 cites W1489496897 @default.
- W2154996206 cites W1493744513 @default.
- W2154996206 cites W1497974906 @default.
- W2154996206 cites W1498316612 @default.
- W2154996206 cites W1513098086 @default.
- W2154996206 cites W1513455856 @default.
- W2154996206 cites W1513551553 @default.
- W2154996206 cites W1516033050 @default.
- W2154996206 cites W1521325919 @default.
- W2154996206 cites W1534388293 @default.
- W2154996206 cites W1550901512 @default.
- W2154996206 cites W1556212265 @default.
- W2154996206 cites W1569083856 @default.
- W2154996206 cites W1571885089 @default.
- W2154996206 cites W1585096027 @default.
- W2154996206 cites W1589843374 @default.
- W2154996206 cites W1590823599 @default.
- W2154996206 cites W1594802052 @default.
- W2154996206 cites W1596208550 @default.
- W2154996206 cites W1597695477 @default.
- W2154996206 cites W1605699871 @default.
- W2154996206 cites W1610688607 @default.
- W2154996206 cites W1660562555 @default.
- W2154996206 cites W1763482972 @default.
- W2154996206 cites W177444027 @default.
- W2154996206 cites W1784406605 @default.
- W2154996206 cites W1797206029 @default.
- W2154996206 cites W1890078278 @default.
- W2154996206 cites W1892798954 @default.
- W2154996206 cites W1957399513 @default.
- W2154996206 cites W1972675802 @default.
- W2154996206 cites W1990220158 @default.
- W2154996206 cites W1992602037 @default.
- W2154996206 cites W1996360405 @default.
- W2154996206 cites W1998368731 @default.
- W2154996206 cites W2003736153 @default.
- W2154996206 cites W2019708396 @default.
- W2154996206 cites W2026892462 @default.
- W2154996206 cites W2036378739 @default.
- W2154996206 cites W2036485042 @default.
- W2154996206 cites W2052267638 @default.
- W2154996206 cites W2052995417 @default.
- W2154996206 cites W2067095453 @default.
- W2154996206 cites W2073210531 @default.
- W2154996206 cites W2076046175 @default.
- W2154996206 cites W2086042811 @default.
- W2154996206 cites W2086859431 @default.
- W2154996206 cites W2088091599 @default.
- W2154996206 cites W2094240047 @default.
- W2154996206 cites W2099000090 @default.
- W2154996206 cites W2101709669 @default.
- W2154996206 cites W2108072891 @default.
- W2154996206 cites W2108343866 @default.
- W2154996206 cites W2109394932 @default.
- W2154996206 cites W2112876561 @default.
- W2154996206 cites W2113999696 @default.
- W2154996206 cites W2114428623 @default.
- W2154996206 cites W2117682799 @default.
- W2154996206 cites W2117685508 @default.
- W2154996206 cites W2121321202 @default.
- W2154996206 cites W2122058555 @default.
- W2154996206 cites W2125974812 @default.
- W2154996206 cites W2131846073 @default.
- W2154996206 cites W2136039867 @default.
- W2154996206 cites W2137767448 @default.
- W2154996206 cites W2138001464 @default.
- W2154996206 cites W2139343945 @default.
- W2154996206 cites W2141420453 @default.
- W2154996206 cites W2146149890 @default.
- W2154996206 cites W2147419555 @default.
- W2154996206 cites W2147929033 @default.
- W2154996206 cites W2151471396 @default.
- W2154996206 cites W2152688060 @default.
- W2154996206 cites W2155690458 @default.
- W2154996206 cites W2156186849 @default.
- W2154996206 cites W2156318122 @default.
- W2154996206 cites W2158553589 @default.
- W2154996206 cites W2159274726 @default.
- W2154996206 cites W2159320685 @default.
- W2154996206 cites W2160608575 @default.
- W2154996206 cites W2161214158 @default.
- W2154996206 cites W2161214567 @default.
- W2154996206 cites W2164706912 @default.
- W2154996206 cites W2164988972 @default.
- W2154996206 cites W2168483707 @default.
- W2154996206 cites W2168571148 @default.
- W2154996206 cites W2169691038 @default.
- W2154996206 cites W2270532568 @default.
- W2154996206 cites W2405827315 @default.
- W2154996206 cites W2607981406 @default.
- W2154996206 cites W2912577494 @default.
- W2154996206 cites W3128663643 @default.