Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption.
Jan CamenischMaria DubovitskayaRobert R. EnderleinGregory NevenPublished in: IACR Cryptol. ePrint Arch. (2012)
Keyphrases
- access control
- fine grained
- dynamic access control
- ciphertext
- attribute based encryption
- data security
- access control policies
- security model
- security policies
- role based access control
- transfer learning
- database security
- security mechanisms
- identity management
- access control models
- access control mechanism
- lightweight
- security requirements
- knowledge transfer
- data management