An Efficient CCA-Secure Access Control Encryption for Any Policy.
Gaosheng TanRui ZhangHui MaYang TaoPublished in: Inscrypt (2020)
Keyphrases
- access control
- access control policies
- encryption scheme
- cca secure
- rbac model
- ciphertext
- security model
- proxy re encryption
- dynamic access control
- data security
- security analysis
- security policies
- digital rights management
- data protection
- role based access control
- conflict resolution
- standard model
- xml access control
- security mechanisms
- access control mechanism
- secret key
- public key cryptosystem
- public key
- security requirements
- key management
- lossless compression
- intrusion detection
- low cost