Filters








732 Hits in 5.7 sec

Homomorphic Encryption with Access Policies: Characterization and New Constructions [chapter]

Michael Clear, Arthur Hughes, Hitesh Tewari
2013 Lecture Notes in Computer Science  
A characterization of predicate encryption (PE) with support for homomorphic operations is presented and we describe the homomorphic properties of some existing PE constructions.  ...  We were unable to construct an anonymous variant that preserves this homomorphic property, but we achieved anonymity for a weaker notion of homomorphic encryption, which we call non-universal.  ...  We leave to future work the exploration of homomorphic encryption with access policies in a more general setting .  ... 
doi:10.1007/978-3-642-38553-7_4 fatcat:jdbgof47ozcafhnxpihfzgrmzi

Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms [chapter]

Jérémy Chotard, Duong Hieu Phan, David Pointcheval
2017 Lecture Notes in Computer Science  
Ciphertext-policy ABE schemes can choose the policy at the encryption time. In this paper, we define a new property for ABE: homomorphic-policy.  ...  More precisely, using linear secret sharing schemes, we design Attribute-Based Key Encapsulation Mechanisms (ABKEM) with the Homomorphic-Policy property: given several encapsulations of the same keys under  ...  This work was supported in part by the European Community's Seventh Framework Programme (FP7/2007-2013 Grant Agreement no. 339563 -CryptoCloud) and by the French ANR ALAMBIC project (ANR-16-CE39-0006).  ... 
doi:10.1007/978-3-319-69659-1_9 fatcat:plb45wuvxfflnelkwgjwahs4ti

Curie: Policy-based Secure Data Exchange [article]

Z. Berkay Celik, Hidayet Aksu, Abbas Acar, Ryan Sheatsley, A. Selcuk Uluagac, Patrick McDaniel
2019 arXiv   pre-print
The agreement is implemented in a multi-party computation that guarantees sharing among members will comply with the policy as negotiated.  ...  Members (partners) assert who and what to exchange through their local policies and negotiate a global sharing agreement.  ...  Our first set of experiments characterize the policy construction and negotiation costs.  ... 
arXiv:1702.08342v3 fatcat:bkkocvnj5betvamg4b4dih2gpq

A privacy-preserving approach to policy-based content dissemination

Ning Shang, Mohamed Nabeel, Federica Paci, Elisa Bertino
2010 2010 IEEE 26th International Conference on Data Engineering (ICDE 2010)  
In line with modern attribute-based access control, policies are specified against identity attributes of users.  ...  Based on such policies, a broadcast document is segmented into multiple subdocuments, each encrypted with a different key.  ...  ABE has two variations: associating encrypted documents with attributes and user keys with policies [12] ; associating user keys with attributes and encrypted documents with policies [11] .  ... 
doi:10.1109/icde.2010.5447902 dblp:conf/icde/ShangNPB10 fatcat:frinjz4b4fcmdndza4ba5jer2i

Repairing mappings under policy views [article]

Angela Bonifati, Ugo Comignani, Efthymia Tsamoura
2019 arXiv   pre-print
The privacy restrictions are expressed as a set of policy views representing the information that is safe to expose over all instances of the source.  ...  We also propose an algorithm for repairing an input mapping w.r.t. a set of policy views, in cases where the input mapping leaks sensitive information.  ...  Our assumptions and setting are quite different, since our multiple policy views are accessible to every user and our goal is to render the s-t mappings safe with respect to a set of policies via repairing  ... 
arXiv:1903.09242v1 fatcat:sv26saucdngf3b63komhypip4e

Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits [article]

Omar Chowdhury, Deepak Garg, Limin Jia, Anupam Datta
2015 arXiv   pre-print
As a specific application, we adapt an existing algorithm for finding violations of privacy policies to run on logs encrypted under our schemes and observe low to moderate overheads.  ...  Motivated by the problem of simultaneously preserving confidentiality and usability of data outsourced to third-party clouds, we present two different database encryption schemes that largely hide data  ...  Our schemes do not support queries like aggregation (which would require an underlying homomorphic encryption scheme and completely new security proofs).  ... 
arXiv:1508.02448v1 fatcat:rftqzgbdr5h73gxgyodo5t7v4u

Elliptic Curve based Collaborative Group Key Management for Cloud Data Sharing in Ciphertext Policy Attribute based Encryption

2019 International Journal of Engineering and Advanced Technology  
Ciphertext policy attribute based encryption (CPABE) is one of cryptographic procedure that coordinates data information encryption with authenticated admission management for guaranteeing data information  ...  By utilizing the Shamir's Threshold secret sharing designs access structure to develop the expressiveness of the entrance arrangement.  ...  Security Model The security model will prepare the access control policy. It is classified among challenger and a challenger Initialization.  ... 
doi:10.35940/ijeat.f1098.0886s19 fatcat:hytsab2xffbpfohuxrlm4tysti

Dynamic attribute-based privacy-preserving genomic susceptibility testing

Mina Namazi, Cihan Eryonucu, Erman Ayday, Fernando Pérez-González
2019 Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing - SAC '19  
Moreover, we exceed the computation performance of the susceptibility testing over the encrypted genomic data while we manage attributes and embedded access policies.  ...  We determine the challenges for the computations required to process the outsourced data and access control simultaneously within patient-doctor interactions.  ...  [10] which deals with just one medical unit with no embedded access policies.  ... 
doi:10.1145/3297280.3297428 dblp:conf/sac/NamaziEAP19 fatcat:tbdqdgoszbeyldmouf7p4dvap4

Bootstrappable Identity-Based Fully Homomorphic Encryption [chapter]

Michael Clear, Ciarán McGoldrick
2014 Lecture Notes in Computer Science  
It has been an open problem for a number of years to construct an identity-based fully homomorphic encryption (IBFHE) scheme (first mentioned by Naccache at CHES/CRYPTO 2010).  ...  18] with a puncturable pesudorandom function (PRF) [19] [20] [21] , There are other variants such as ciphertext-policy ABE [23], but we focus on key-policy ABE here.  ...  We would like to especially thank one of the reviewers for suggesting an improvement to the attribute-based construction in Section 3.1 in addition to suggesting interesting directions for future work.  ... 
doi:10.1007/978-3-319-12280-9_1 fatcat:sajo7ysvovgvnm5r33hvstwewe

Attribute-Based Fully Homomorphic Encryption with a Bounded Number of Inputs [chapter]

Michael Clear, Ciarán McGoldrick
2016 Lecture Notes in Computer Science  
The only known way to achieve Attribute-based Fully Homomorphic Encryption (ABFHE) is through indistinguishability obfsucation.  ...  Our construction relies on multi-key FHE and leveled ABFHE, both of which have been realized from LWE, and therefore we obtain a concrete scheme that is secure under LWE.  ...  Furthermore we can instantiate the leveled ABFHE in our construction with the leveled ABFHE of Gentry, Sahai and Waters [6] , which is shown to be selectively secure under LWE.  ... 
doi:10.1007/978-3-319-31517-1_16 fatcat:e3zlnnmfajf6lcincfd4olq64q

A Secured Homomorphic Encryption Technique in Cloud Computing

Nitin Kamble, Pragati Hiwarkar, Monali Bachhav
2017 International Journal of Computer Applications  
When the data transferred to the Cloud we use standard encryption methods to secure the operations and the storage of the data.  ...  For processing data located on a remote server, the Cloud providers need to access the raw data.  ...  Cloud computing is currently characterized by having an on demand access to elastic resources via a lease model.  ... 
doi:10.5120/ijca2017915501 fatcat:4u7ge5bakjffhnxfbwfmft2c7y

Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Content System

Jyoti .V. Ighare
2017 International Journal of Engineering Research and Applications  
In this Homomorphic encryption technique with SHA hash technique.  ...  [10] proposes CP-ABE (Ciphertext-Policy Attribute-Based Encryption) that owners which encryptors can define their own data access policies by themselves, that more suitable for the implementation of  ... 
doi:10.9790/9622-0705031014 fatcat:n42denz5kvgrdd6pbsh2tt2nd4

A Hierarchical Extraction Policy for content extraction signatures

Laurence Bull, David McG. Squire, Yuliang Zheng
2004 International Journal on Digital Libraries  
Extending this ability, we introduce a new Hierarchical Grouping Extraction Policy that is more powerful, and for which the encoding is dramatically smaller, than the existing Grouping Extraction Policy  ...  We also show how to implement the new extraction policy using XML signatures with a custom transform along with an improved design for the XML signature structure in order to achieve CES functionality.  ...  Also, we wish to thank the anonymous reviewers for their constructive, detailed comments and suggestions in helping to improve the correctness and presentation of this paper.  ... 
doi:10.1007/s00799-004-0082-z fatcat:pkmjbjcjqjhvpjcjv6nze26aoe

Attribute-based fully homomorphic encryption with a bounded number of inputs

Ciarán Mc Goldrick, Michael Clear
2017 International Journal of Applied Cryptography  
The only known way to achieve Attribute-based Fully Homomorphic Encryption (ABFHE) is through indistinguishability obfuscation.  ...  Our construction relies on multi-key FHE and leveled ABFHE, both of which have been realized from LWE, and therefore we obtain a concrete scheme that is secure under LWE.  ...  A concrete ABHE scheme is characterized by three facets: 1). its supported computations (i.e. the class of circuits C); 2). its supported access policies (the class of access policies F); and 3). its supported  ... 
doi:10.1504/ijact.2017.10010329 fatcat:u56mktp54bablcxnnwemxaqese

Attribute-based fully homomorphic encryption with a bounded number of inputs

Michael Clear, Ciarán Mc Goldrick
2017 International Journal of Applied Cryptography  
The only known way to achieve Attribute-based Fully Homomorphic Encryption (ABFHE) is through indistinguishability obfuscation.  ...  Our construction relies on multi-key FHE and leveled ABFHE, both of which have been realized from LWE, and therefore we obtain a concrete scheme that is secure under LWE.  ...  A concrete ABHE scheme is characterized by three facets: 1). its supported computations (i.e. the class of circuits C); 2). its supported access policies (the class of access policies F); and 3). its supported  ... 
doi:10.1504/ijact.2017.089356 fatcat:pagtcewegncldkc6ddfzwxngyi
« Previous Showing results 1 — 15 out of 732 results