Policy-based Non-interactive Outsourcing of Computation using Multikey FHE and CP-ABE
Michael Clear, Ciarán McGoldrick
2013
Abstract
.
References
- Bethencourt, J., Sahai, A., and Waters, B. (2007). Ciphertext-policy attribute-based encryption. In Proceedings of the 2007 IEEE Symposium on Security and Privacy, SP 7807, pages 321-334, Washington, DC, USA. IEEE Computer Society.
- Bonatti, P., De Capitani di Vimercati, S., and Samarati, P. (2002). An algebra for composing access control policies. ACM Trans. Inf. Syst. Secur., 5(1):1-35.
- Bruns, G., Dantas, D. S., and Huth, M. (2007). A simple and expressive semantic framework for policy composition in access control. In Proceedings of the 2007 ACM workshop on Formal methods in security engineering, FMSE 7807, pages 12-21, New York, NY, USA. ACM.
- Clear, M., Hughes, A., and Tewari, H. (2013). Homomorphic encryption with access policies: Characterization and new constructions. In Youssef, A., Nitaj, A., and Hassanien, A., editors, Progress in Cryptology AFRICACRYPT 2013, volume 7918 of Lecture Notes in Computer Science, pages 61-87. Springer Berlin Heidelberg.
- Clear, M. and McGoldrick, C. (2013). Policy-Based Noninteractive Outsourcing of Computation using multikey FHE and CP-ABE. Cryptology ePrint Archive. http://eprint.iacr.org/.
- Gentry, C. (2009). Fully homomorphic encryption using ideal lattices. Proceedings of the 41st annual ACM symposium on Symposium on theory of computing STOC 09, (September):169.
- Gentry, C., Halevi, S., and Vaikuntanathan, V. (2010). A Simple BGN-Type Cryptosystem from LWE. In Gilbert, H., editor, EUROCRYPT, volume 6110 of Lecture Notes in Computer Science, pages 506-522. Springer.
- Hoffstein, J., Pipher, J., and Silverman, J. H. (1998). NTRU: a ring-based public key cryptosystem. Lecture Notes in Computer Science, 1423:267-288.
- L ópez-Alt, A., Tromer, E., and Vaikuntanathan, V. (2012). On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption. In Proceedings of the 44th symposium on Theory of Computing, STOC 7812, pages 1219-1234, New York, NY, USA. ACM.
- Moses, T. et al. (2005). Extensible access control markup language (xacml) version 2.0. Oasis Standard, 200502.
- Ni, Q., Bertino, E., and Lobo, J. (2009). D-algebra for composing access control policy decisions. In Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS 7809, pages 298-309, New York, NY, USA. ACM.
- Pirretti, M., Traynor, P., McDaniel, P., and Waters, B. (2010). Secure attribute-based systems. Journal of Computer Security, 18(5):799-837.
- Rao, P., Lin, D., Bertino, E., Li, N., and Lobo, J. (2011). Fine-grained integration of access control policies. Computers & Security, 30(23):91 - 107. ¡ce:title¿Special Issue on Access Control Methods and Technologies¡/ce:title¿.
- Waters, B. (2011). Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In Catalano, D., Fazio, N., Gennaro, R., and Nicolosi, A., editors, Public Key Cryptography, volume 6571 of Lecture Notes in Computer Science, pages 53-70. Springer.
- Xiao, L., Bastani, O., and Yen, I.-L. (2012). An efficient homomorphic encryption protocol for multi-user systems. IACR Cryptology ePrint Archive, 2012:193.
Paper Citation
in Harvard Style
Clear M. and McGoldrick C. (2013). Policy-based Non-interactive Outsourcing of Computation using Multikey FHE and CP-ABE . In Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013) ISBN 978-989-8565-73-0, pages 444-452. DOI: 10.5220/0004534304440452
in Bibtex Style
@conference{secrypt13,
author={Michael Clear and Ciarán McGoldrick},
title={Policy-based Non-interactive Outsourcing of Computation using Multikey FHE and CP-ABE},
booktitle={Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)},
year={2013},
pages={444-452},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004534304440452},
isbn={978-989-8565-73-0},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)
TI - Policy-based Non-interactive Outsourcing of Computation using Multikey FHE and CP-ABE
SN - 978-989-8565-73-0
AU - Clear M.
AU - McGoldrick C.
PY - 2013
SP - 444
EP - 452
DO - 10.5220/0004534304440452