[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Han et al., 2015 - Google Patents

AAC-OT: accountable oblivious transfer with access control

Han et al., 2015

View PDF
Document ID
16123103384047792129
Author
Han J
Susilo W
Mu Y
Au M
Cao J
Publication year
Publication venue
IEEE Transactions on Information Forensics and Security

External Links

Snippet

To prevent illegal users accessing the database and protect users' privacy, oblivious transfer with access control (AC-OT) was proposed. In an AC-OT scheme, the database provider can encrypt the records and publish corresponding access control lists (ACLs). Prior to …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0823Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage

Similar Documents

Publication Publication Date Title
Morais et al. A survey on zero knowledge range proofs and applications
Li et al. Full verifiability for outsourced decryption in attribute based encryption
Wang et al. Attribute-based data sharing scheme revisited in cloud computing
Li et al. User collusion avoidance CP-ABE with efficient attribute revocation for cloud storage
CN109981641B (en) Block chain technology-based safe publishing and subscribing system and publishing and subscribing method
Camenisch et al. Oblivious transfer with access control
Wang et al. Efficiently revocable and searchable attribute-based encryption scheme for mobile cloud storage
US8522040B2 (en) Oblivious transfer with access control
Xu et al. Secure multi-authority data access control scheme in cloud storage system based on attribute-based signcryption
Liu et al. Blockchain-cloud transparent data marketing: Consortium management and fairness
Sun et al. Non-repudiation storage and access control scheme of insurance data based on blockchain in IPFS
Liang et al. Privacy-preserving decentralized ABE for secure sharing of personal health records in cloud storage
Yi et al. Privacy-preserving user profile matching in social networks
Huang et al. Secure data group sharing and conditional dissemination with multi-owner in cloud computing
Li et al. Flexible CP-ABE based access control on encrypted data for mobile users in hybrid cloud system
Liu et al. A fair data access control towards rational users in cloud storage
Herranz Restricted adaptive oblivious transfer
Dhakad et al. EPPDP: an efficient privacy-preserving data possession with provable security in cloud storage
Boshrooyeh et al. Privado: Privacy-preserving group-based advertising using multiple independent social network providers
Han et al. AAC-OT: accountable oblivious transfer with access control
Ali et al. Authorized attribute-based encryption multi-keywords search with policy updating
Li et al. Multi-user searchable encryption with a designated server
Kerschbaum et al. RFID-based supply chain partner authentication and key agreement
Han et al. TCA-PEKS: Trusted certificateless authentication public-key encryption with keyword search scheme in cloud storage
Deepika et al. Blockchain-based decentralized security using Crypto-Proof of Stake for securing sensitive personal health care records