Policy-based Non-interactive Outsourcing of Computation using Multikey FHE and CP-ABE

Michael Clear, Ciarán McGoldrick

Abstract

.

References

  1. Bethencourt, J., Sahai, A., and Waters, B. (2007). Ciphertext-policy attribute-based encryption. In Proceedings of the 2007 IEEE Symposium on Security and Privacy, SP 7807, pages 321-334, Washington, DC, USA. IEEE Computer Society.
  2. Bonatti, P., De Capitani di Vimercati, S., and Samarati, P. (2002). An algebra for composing access control policies. ACM Trans. Inf. Syst. Secur., 5(1):1-35.
  3. Bruns, G., Dantas, D. S., and Huth, M. (2007). A simple and expressive semantic framework for policy composition in access control. In Proceedings of the 2007 ACM workshop on Formal methods in security engineering, FMSE 7807, pages 12-21, New York, NY, USA. ACM.
  4. Clear, M., Hughes, A., and Tewari, H. (2013). Homomorphic encryption with access policies: Characterization and new constructions. In Youssef, A., Nitaj, A., and Hassanien, A., editors, Progress in Cryptology AFRICACRYPT 2013, volume 7918 of Lecture Notes in Computer Science, pages 61-87. Springer Berlin Heidelberg.
  5. Clear, M. and McGoldrick, C. (2013). Policy-Based Noninteractive Outsourcing of Computation using multikey FHE and CP-ABE. Cryptology ePrint Archive. http://eprint.iacr.org/.
  6. Gentry, C. (2009). Fully homomorphic encryption using ideal lattices. Proceedings of the 41st annual ACM symposium on Symposium on theory of computing STOC 09, (September):169.
  7. Gentry, C., Halevi, S., and Vaikuntanathan, V. (2010). A Simple BGN-Type Cryptosystem from LWE. In Gilbert, H., editor, EUROCRYPT, volume 6110 of Lecture Notes in Computer Science, pages 506-522. Springer.
  8. Hoffstein, J., Pipher, J., and Silverman, J. H. (1998). NTRU: a ring-based public key cryptosystem. Lecture Notes in Computer Science, 1423:267-288.
  9. L ópez-Alt, A., Tromer, E., and Vaikuntanathan, V. (2012). On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption. In Proceedings of the 44th symposium on Theory of Computing, STOC 7812, pages 1219-1234, New York, NY, USA. ACM.
  10. Moses, T. et al. (2005). Extensible access control markup language (xacml) version 2.0. Oasis Standard, 200502.
  11. Ni, Q., Bertino, E., and Lobo, J. (2009). D-algebra for composing access control policy decisions. In Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS 7809, pages 298-309, New York, NY, USA. ACM.
  12. Pirretti, M., Traynor, P., McDaniel, P., and Waters, B. (2010). Secure attribute-based systems. Journal of Computer Security, 18(5):799-837.
  13. Rao, P., Lin, D., Bertino, E., Li, N., and Lobo, J. (2011). Fine-grained integration of access control policies. Computers & Security, 30(23):91 - 107. ¡ce:title¿Special Issue on Access Control Methods and Technologies¡/ce:title¿.
  14. Waters, B. (2011). Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In Catalano, D., Fazio, N., Gennaro, R., and Nicolosi, A., editors, Public Key Cryptography, volume 6571 of Lecture Notes in Computer Science, pages 53-70. Springer.
  15. Xiao, L., Bastani, O., and Yen, I.-L. (2012). An efficient homomorphic encryption protocol for multi-user systems. IACR Cryptology ePrint Archive, 2012:193.
Download


Paper Citation


in Harvard Style

Clear M. and McGoldrick C. (2013). Policy-based Non-interactive Outsourcing of Computation using Multikey FHE and CP-ABE . In Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013) ISBN 978-989-8565-73-0, pages 444-452. DOI: 10.5220/0004534304440452


in Bibtex Style

@conference{secrypt13,
author={Michael Clear and Ciarán McGoldrick},
title={Policy-based Non-interactive Outsourcing of Computation using Multikey FHE and CP-ABE},
booktitle={Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)},
year={2013},
pages={444-452},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004534304440452},
isbn={978-989-8565-73-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)
TI - Policy-based Non-interactive Outsourcing of Computation using Multikey FHE and CP-ABE
SN - 978-989-8565-73-0
AU - Clear M.
AU - McGoldrick C.
PY - 2013
SP - 444
EP - 452
DO - 10.5220/0004534304440452