File Download
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/INFCOMW.2011.5928782
- Scopus: eid_2-s2.0-79960568175
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Exclusion-intersection encryption
Title | Exclusion-intersection encryption |
---|---|
Authors | |
Keywords | access control applied cryptography compact private key data confidentiality identity-based encryption pairings |
Issue Date | 2011 |
Publisher | IEEE. The Journal's web site is located at http://ieeexplore.ieee.org/xpl/conhome.jsp?punumber=1001779 |
Citation | The 1st IEEE International Workshop on Security in Computers, Networking and Communications (SCNC 2011) in conjuntion with IEEE INFOCOM 2011, Shanghai, China, 10-15 April 2011. In Conference Proceedings of INFOCOM WKSHPS, 2011, p. 1048-1053 How to Cite? |
Abstract | Identity-based encryption (IBE) has shown to be a useful cryptographic scheme enabling secure yet flexible role-based access control. We propose a new variant of IBE named as exclusion-intersection encryption: during encryption, the sender can specify the targeted groups that are legitimate and interested in reading the documents; there exists a trusted key generation centre generating the intersection private decryption keys on request. This special private key can only be used to decrypt the ciphertext which is of all the specified groups' interests, its holders are excluded from decrypting when the documents are not targeted to all these groups (e.g., the ciphertext of only a single group's interest). While recent advances in cryptographic techniques (e.g., attribute-based encryption or wicked IBE) can support a more general access control policy, the private key size may be as long as the number of attributes or identifiers that can be specified in a ciphertext, which is undesirable, especially when each user may receive a number of such keys for different decryption power. One of the applications of our notion is to support an ad-hoc joint project of two or more groups which needs extra helpers that are not from any particular group. © 2011 IEEE. |
Persistent Identifier | http://hdl.handle.net/10722/139991 |
ISBN | |
References |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chow, SSM | en_HK |
dc.contributor.author | Yiu, SM | en_HK |
dc.date.accessioned | 2011-09-23T06:04:28Z | - |
dc.date.available | 2011-09-23T06:04:28Z | - |
dc.date.issued | 2011 | en_HK |
dc.identifier.citation | The 1st IEEE International Workshop on Security in Computers, Networking and Communications (SCNC 2011) in conjuntion with IEEE INFOCOM 2011, Shanghai, China, 10-15 April 2011. In Conference Proceedings of INFOCOM WKSHPS, 2011, p. 1048-1053 | en_HK |
dc.identifier.isbn | 978-1-4577-0248-8 | - |
dc.identifier.uri | http://hdl.handle.net/10722/139991 | - |
dc.description.abstract | Identity-based encryption (IBE) has shown to be a useful cryptographic scheme enabling secure yet flexible role-based access control. We propose a new variant of IBE named as exclusion-intersection encryption: during encryption, the sender can specify the targeted groups that are legitimate and interested in reading the documents; there exists a trusted key generation centre generating the intersection private decryption keys on request. This special private key can only be used to decrypt the ciphertext which is of all the specified groups' interests, its holders are excluded from decrypting when the documents are not targeted to all these groups (e.g., the ciphertext of only a single group's interest). While recent advances in cryptographic techniques (e.g., attribute-based encryption or wicked IBE) can support a more general access control policy, the private key size may be as long as the number of attributes or identifiers that can be specified in a ciphertext, which is undesirable, especially when each user may receive a number of such keys for different decryption power. One of the applications of our notion is to support an ad-hoc joint project of two or more groups which needs extra helpers that are not from any particular group. © 2011 IEEE. | en_HK |
dc.language | eng | en_US |
dc.publisher | IEEE. The Journal's web site is located at http://ieeexplore.ieee.org/xpl/conhome.jsp?punumber=1001779 | - |
dc.relation.ispartof | IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2011 | en_HK |
dc.subject | access control | en_HK |
dc.subject | applied cryptography | en_HK |
dc.subject | compact private key | en_HK |
dc.subject | data confidentiality | en_HK |
dc.subject | identity-based encryption | en_HK |
dc.subject | pairings | en_HK |
dc.title | Exclusion-intersection encryption | en_HK |
dc.type | Conference_Paper | en_HK |
dc.identifier.email | Yiu, SM:smyiu@cs.hku.hk | en_HK |
dc.identifier.authority | Yiu, SM=rp00207 | en_HK |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1109/INFCOMW.2011.5928782 | en_HK |
dc.identifier.scopus | eid_2-s2.0-79960568175 | en_HK |
dc.identifier.hkuros | 192253 | en_US |
dc.relation.references | http://www.scopus.com/mlt/select.url?eid=2-s2.0-79960568175&selection=ref&src=s&origin=recordpage | en_HK |
dc.identifier.spage | 1048 | en_HK |
dc.identifier.epage | 1053 | en_HK |
dc.description.other | The 1st IEEE International Workshop on Security in Computers, Networking and Communications (SCNC 2011) in conjuntion with IEEE INFOCOM 2011, Shanghai, China, 10-15 April 2011. In Conference Proceedings of INFOCOM WKSHPS, 2011, p. 1048-1053 | - |
dc.description.other | The 1st IEEE International Workshop on Security in Computers, Networking and Communications (SCNC 2011) in conjuntion with IEEE INFOCOM 2011, Shanghai, China, 10-15 April 2011. In Conference Proceedings of INFOCOM WKSHPS, 2011, p. 1048-1053 | - |
dc.identifier.scopusauthorid | Chow, SSM=8980575500 | en_HK |
dc.identifier.scopusauthorid | Yiu, SM=7003282240 | en_HK |