A hierarchical access control encryption scheme based on partially ordered set

Lintao Dang, Qiang Li*, Jun Wu, Jianhua Li

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Access Control Encryption (ACE) is a novel cryptographic primitive that controls not only what the users in a system can read, but also what they are allowed to write. Based on the concept of partially ordered set, this paper proposes a hierarchical access control encryption scheme (HACE), which, while maintaining the three properties of ACE: Correctness, No-Read Rule and No-Write Rule, enjoys the newly defined No-Leaking Hierarchy Rule under CPA attack in the random oracle model. This rule ensures that the sanitizer cannot learn any information about the access control hierarchy. The performance evaluation shows that the HACE scheme reduces the space overhead for the parameter storage compared with the ACE scheme for multiple identities.

Original languageEnglish
Title of host publicationProceedings of 2018 the 2nd International Conference on Cryptography, Security and Privacy, ICCSP 2018
PublisherAssociation for Computing Machinery
Pages122-127
Number of pages6
ISBN (Electronic)9781450363617
DOIs
Publication statusPublished - 2018 Mar 16
Externally publishedYes
Event2nd International Conference on Cryptography, Security and Privacy, ICCSP 2018 - Guiyang, China
Duration: 2018 Mar 162018 Mar 18

Publication series

NameACM International Conference Proceeding Series

Conference

Conference2nd International Conference on Cryptography, Security and Privacy, ICCSP 2018
Country/TerritoryChina
CityGuiyang
Period18/3/1618/3/18

Keywords

  • Access Control Encryption
  • Hierarchy
  • Partially Ordered Set

ASJC Scopus subject areas

  • Software
  • Human-Computer Interaction
  • Computer Vision and Pattern Recognition
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'A hierarchical access control encryption scheme based on partially ordered set'. Together they form a unique fingerprint.

Cite this