TY - GEN
T1 - A hierarchical access control encryption scheme based on partially ordered set
AU - Dang, Lintao
AU - Li, Qiang
AU - Wu, Jun
AU - Li, Jianhua
N1 - Funding Information:
The authors appreciate the supports from the National Key R&D Program of China under Grant No.2017YFB0802-100, and this paper was also partially supported by the National Natural Science Foundation of China under Grant 61431008.
Publisher Copyright:
© 2018 Association for Computing Machinery.
PY - 2018/3/16
Y1 - 2018/3/16
N2 - Access Control Encryption (ACE) is a novel cryptographic primitive that controls not only what the users in a system can read, but also what they are allowed to write. Based on the concept of partially ordered set, this paper proposes a hierarchical access control encryption scheme (HACE), which, while maintaining the three properties of ACE: Correctness, No-Read Rule and No-Write Rule, enjoys the newly defined No-Leaking Hierarchy Rule under CPA attack in the random oracle model. This rule ensures that the sanitizer cannot learn any information about the access control hierarchy. The performance evaluation shows that the HACE scheme reduces the space overhead for the parameter storage compared with the ACE scheme for multiple identities.
AB - Access Control Encryption (ACE) is a novel cryptographic primitive that controls not only what the users in a system can read, but also what they are allowed to write. Based on the concept of partially ordered set, this paper proposes a hierarchical access control encryption scheme (HACE), which, while maintaining the three properties of ACE: Correctness, No-Read Rule and No-Write Rule, enjoys the newly defined No-Leaking Hierarchy Rule under CPA attack in the random oracle model. This rule ensures that the sanitizer cannot learn any information about the access control hierarchy. The performance evaluation shows that the HACE scheme reduces the space overhead for the parameter storage compared with the ACE scheme for multiple identities.
KW - Access Control Encryption
KW - Hierarchy
KW - Partially Ordered Set
UR - http://www.scopus.com/inward/record.url?scp=85052012755&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85052012755&partnerID=8YFLogxK
U2 - 10.1145/3199478.3199485
DO - 10.1145/3199478.3199485
M3 - Conference contribution
AN - SCOPUS:85052012755
T3 - ACM International Conference Proceeding Series
SP - 122
EP - 127
BT - Proceedings of 2018 the 2nd International Conference on Cryptography, Security and Privacy, ICCSP 2018
PB - Association for Computing Machinery
T2 - 2nd International Conference on Cryptography, Security and Privacy, ICCSP 2018
Y2 - 16 March 2018 through 18 March 2018
ER -