Han et al., 2015 - Google Patents
AAC-OT: accountable oblivious transfer with access controlHan et al., 2015
View PDF- Document ID
- 16123103384047792129
- Author
- Han J
- Susilo W
- Mu Y
- Au M
- Cao J
- Publication year
- Publication venue
- IEEE Transactions on Information Forensics and Security
External Links
Snippet
To prevent illegal users accessing the database and protect users' privacy, oblivious transfer with access control (AC-OT) was proposed. In an AC-OT scheme, the database provider can encrypt the records and publish corresponding access control lists (ACLs). Prior to …
- 230000000875 corresponding 0 abstract description 3
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0823—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Morais et al. | A survey on zero knowledge range proofs and applications | |
Li et al. | Full verifiability for outsourced decryption in attribute based encryption | |
Wang et al. | Attribute-based data sharing scheme revisited in cloud computing | |
Li et al. | User collusion avoidance CP-ABE with efficient attribute revocation for cloud storage | |
CN109981641B (en) | Block chain technology-based safe publishing and subscribing system and publishing and subscribing method | |
Camenisch et al. | Oblivious transfer with access control | |
Wang et al. | Efficiently revocable and searchable attribute-based encryption scheme for mobile cloud storage | |
US8522040B2 (en) | Oblivious transfer with access control | |
Xu et al. | Secure multi-authority data access control scheme in cloud storage system based on attribute-based signcryption | |
Liu et al. | Blockchain-cloud transparent data marketing: Consortium management and fairness | |
Sun et al. | Non-repudiation storage and access control scheme of insurance data based on blockchain in IPFS | |
Liang et al. | Privacy-preserving decentralized ABE for secure sharing of personal health records in cloud storage | |
Yi et al. | Privacy-preserving user profile matching in social networks | |
Huang et al. | Secure data group sharing and conditional dissemination with multi-owner in cloud computing | |
Li et al. | Flexible CP-ABE based access control on encrypted data for mobile users in hybrid cloud system | |
Liu et al. | A fair data access control towards rational users in cloud storage | |
Herranz | Restricted adaptive oblivious transfer | |
Dhakad et al. | EPPDP: an efficient privacy-preserving data possession with provable security in cloud storage | |
Boshrooyeh et al. | Privado: Privacy-preserving group-based advertising using multiple independent social network providers | |
Han et al. | AAC-OT: accountable oblivious transfer with access control | |
Ali et al. | Authorized attribute-based encryption multi-keywords search with policy updating | |
Li et al. | Multi-user searchable encryption with a designated server | |
Kerschbaum et al. | RFID-based supply chain partner authentication and key agreement | |
Han et al. | TCA-PEKS: Trusted certificateless authentication public-key encryption with keyword search scheme in cloud storage | |
Deepika et al. | Blockchain-based decentralized security using Crypto-Proof of Stake for securing sensitive personal health care records |