Questions tagged [access-control]

Access-control is a possible goal of cryptography, where the idea is to restrict access to documents, equipment, locations, or keys to individuals who are authorized such access.

Access-control is a possible goal of cryptography, where the idea is to restrict access to documents, equipment, locations, or keys to individuals who are authorized such access.

29 questions
11
votes
0 answers

How exactly does ASKE (Alpha Secure Key Establishment) in Zigbee work?

I am working on Zigbee security. For key establishment, some approaches are given in Zigbee. Some of them are: ASKE (Alpha Secure Key Establishment), ASAC (Alpha Secure Access Control), and SKKE (Symmetric Key Key Establishment). I tried to do my…
10
votes
1 answer

What are the current limitations (and capabilities) of Functional Encryption used for access control?

I'm trying to make my way in Functional Encryption used for access control. I read a lot of papers such as "How to Run Turing Machines on Encrypted Data", "Functional Encryption: New Perspectives and Lower Bounds", or "Attribute-based encryption for…
MaVVamaldo
  • 201
  • 1
  • 5
5
votes
4 answers

Can we give access to controlled functionality in Fully homomorphic encryption schemes?

Homomorphic encryption schemes are PKE schemes with an additional special method Evaluate. Evaluate method takes input any function (as boolean circuit) and encrypted inputs of the function and evaluates the circuit. The results of such function are…
sashank
  • 6,234
  • 4
  • 36
  • 68
5
votes
0 answers

Can I alter encrypted data without decrypting it?

I didn't find a direct solution for it. Can I modify encrypted data without accessing it? If there is an example, I would appreciate it.
3
votes
1 answer

Enabling Oblivious Access Control via Function Encryption

Abstract With Functional Encryption, would access control between two parties be possible without revealing the entirety of one party's policy to the other? E.g. such that a server would be incapable of discerning anything more about a client's…
3
votes
2 answers

Can the access policies defined using different access structures (Monotone Span Program and Access Trees) be used together in CP-ABE scheme?

In order to add authentication features to this CP-ABE scheme, I have tried to combine it with the ABS scheme proposed by Maji et. al. I want to use the sign() and verify() algorithms of ABS scheme. But the problem is that the two scheme support…
Aisha
  • 83
  • 6
2
votes
1 answer

Data Security and Encryption

I have a research paper on data security using proxy re-encryption, and I need to provide an answer to a reviewer's comment. However, I have no idea on what to do or how to answer it. The security analysis of the proposed method is based on…
2
votes
1 answer

What is the relationship between attribute based encryption (ABE) and access control?

So if possible could someone tell me or at least recommend a book.
user658961
  • 45
  • 3
2
votes
2 answers

Access control versus authorization

What is the difference between access control and authorization? They do not mean same as there is a fine line between the two.
Richa
  • 83
  • 5
2
votes
2 answers

Hierarchical access control using CP-ABE

Is it possible to use CP-ABE to provide a layered (hierarchical) organization? For example, If I have 100 records, I will encrypt the first 10 records (lowest level) to be decrypted using certain attributes. The next level can for instance decrypt…
user40428
2
votes
0 answers

hash function notations and existing cryptographic hash algorithms

I am implementing Role-based access control by referencing the paper Enforcing Role-Based Access Control for Secure Data Storage in the Cloud. In page 6, they have mentioned to choose hash functions $H_1$ and $H_2$ during the setup $$H1 : \{0, 1\}^∗…
Mariam
2
votes
1 answer

Multiple levels of encryption

Is it feasible to have data encrypted at different levels of hierarchy I'd like to encrypt an xml database (such as used in www.keepass.info) whereby two or more keys can exist. For example: Key #1 decrypts the entire database file Key #2 decrypts…
Bendy
  • 123
  • 5
2
votes
1 answer

Cryptographic enforcement schemes using Diffie-Hellman

If one wants to set up a decentralized cryptographic enforcement scheme in which the level of 'confidentiality' of information is marked by its position in a poset, why not use Diffie-Hellman to derive the key of a node from its immediate…
wlad
  • 1,259
  • 1
  • 13
  • 24
1
vote
1 answer

Use of crypto on QR codes for access control

I want to create a process whereby registered users receive a QR code on their phone and then they present this code to a camera. The camera should scan the QR code and then decide if the QR code is legitimate, in which case access is…
gmarais
  • 129
  • 4
1
vote
1 answer

authentication and access control in IoT

I am researching in authentication and access control in IoT. Is there any difference between working in wireless sensor nodes and IoT in the topic authentication and access control as both require lightweight designs?
Richa
  • 83
  • 5
1
2