Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption.
Jan CamenischMaria DubovitskayaRobert R. EnderleinGregory NevenPublished in: SCN (2012)
Keyphrases
- access control
- fine grained
- dynamic access control
- security policies
- data security
- security model
- transfer learning
- attribute based encryption
- access control policies
- identity management
- role based access control
- ciphertext
- knowledge transfer
- cross domain
- access structure
- access control models
- databases
- security mechanisms
- security requirements
- data sharing
- diffie hellman
- access control systems
- database design
- object oriented