Back to Search
Start Over
An Efficient CCA-Secure Access Control Encryption for Any Policy
- Source :
- Information Security and Cryptology ISBN: 9783030718510, Inscrypt
- Publication Year :
- 2021
- Publisher :
- Springer International Publishing, 2021.
-
Abstract
- Access control encryption (ACE) is a useful concept introduced by Damgard, Haagh and Orlandi in TCC 2016, which not only protects the data privacy but also controls the information flow. However, their DDH-based scheme suffered from the ciphertext revealing attack (CRA) introduced by Badertscher, Matt and Maurer in Asiacrypt 2017 and just satisfied chosen plaintext attack (CPA) security. Badertscher, Matt and Maurer strengthened the security model to chosen ciphertext attack (CCA) security and constructed a CCA secure scheme under Naor-Yung paradigm. However, they did not indicate how to fix the DDH-based scheme proposed by Damgard, Haagh and Orlandi. Their CCA secure scheme is inefficient and complicated due to the non-interactive zero knowledge proofs (NIZKs) of a very complicated relation. And their scheme is constructed just for limited communication policies.
- Subjects :
- 050101 languages & linguistics
Information privacy
Computer science
business.industry
05 social sciences
02 engineering and technology
Computer security model
Computer security
computer.software_genre
Encryption
Ciphertext
0202 electrical engineering, electronic engineering, information engineering
020201 artificial intelligence & image processing
0501 psychology and cognitive sciences
Zero-knowledge proof
Chosen-plaintext attack
Information flow (information theory)
Chosen-ciphertext attack
business
computer
Subjects
Details
- ISBN :
- 978-3-030-71851-0
- ISBNs :
- 9783030718510
- Database :
- OpenAIRE
- Journal :
- Information Security and Cryptology ISBN: 9783030718510, Inscrypt
- Accession number :
- edsair.doi...........0d50d8ab1e906ce6466226976010b928
- Full Text :
- https://doi.org/10.1007/978-3-030-71852-7_7