peer reviewedOblivious transfer with access control (OTAC) is an extension of oblivious transfer where each message is associated with an access control policy. A receiver can obtain a message only if her attributes satisfy the access control policy for that message. In most schemes, the receiver's attributes are certified by an issuer. Recently, two Issuer-Free OTAC protocols have been proposed. We show that the security definition for Issuer-Free OTAC fulfilled by those schemes poses a problem. Namely, the sender is not able to attest whether a receiver possesses a claimed attribute. Because of this problem, in both Issuer-Free OTAC protocols, any malicious receiver can obtain any message from the sender, regardless of the access control ...
Oblivious transfer (OT) has been applied widely in privacy-sensitive systems such as on-line transac...
Abstract—In an open environment such as the Internet, the decision to collaborate with a stranger (e...
Cryptographic access control offers selective accessto encrypted data via a combination of key manag...
Oblivious transfer with access control (OTAC) is an extension of oblivious transfer where each messa...
An oblivious transfer with access control protocol (OTAC) allows us to protect privacy of accesses t...
AbstractOblivious transfer (OT) is a protocol where a receiver can obtain t-out-of-n services from t...
The notion of oblivious transfer with hidden access control policies (HACOT) was recently proposed b...
In an attribute-based system (ABS), users are identified by various attributes, instead of their ide...
This thesis examines a new approach to attribute-based access control with hidden policies and hidde...
In an attribute-based system (ABS), users are identified by various attributes, instead of their ide...
AbstractIn this work we consider the following primitive, that we call restricted adaptive oblivious...
International audienceOblivious Transfer (OT) protocols were introduced in the seminal paper of Rabi...
In a paper from EuroCrypt'99, Damgård, Kilian and Salvail show various positive and negative results...
[[abstract]]Due to the rapid development of the Internet, an increasing number of applications can b...
Modern access control models, developed for protecting data from accesses across the Internet, requi...
Oblivious transfer (OT) has been applied widely in privacy-sensitive systems such as on-line transac...
Abstract—In an open environment such as the Internet, the decision to collaborate with a stranger (e...
Cryptographic access control offers selective accessto encrypted data via a combination of key manag...
Oblivious transfer with access control (OTAC) is an extension of oblivious transfer where each messa...
An oblivious transfer with access control protocol (OTAC) allows us to protect privacy of accesses t...
AbstractOblivious transfer (OT) is a protocol where a receiver can obtain t-out-of-n services from t...
The notion of oblivious transfer with hidden access control policies (HACOT) was recently proposed b...
In an attribute-based system (ABS), users are identified by various attributes, instead of their ide...
This thesis examines a new approach to attribute-based access control with hidden policies and hidde...
In an attribute-based system (ABS), users are identified by various attributes, instead of their ide...
AbstractIn this work we consider the following primitive, that we call restricted adaptive oblivious...
International audienceOblivious Transfer (OT) protocols were introduced in the seminal paper of Rabi...
In a paper from EuroCrypt'99, Damgård, Kilian and Salvail show various positive and negative results...
[[abstract]]Due to the rapid development of the Internet, an increasing number of applications can b...
Modern access control models, developed for protecting data from accesses across the Internet, requi...
Oblivious transfer (OT) has been applied widely in privacy-sensitive systems such as on-line transac...
Abstract—In an open environment such as the Internet, the decision to collaborate with a stranger (e...
Cryptographic access control offers selective accessto encrypted data via a combination of key manag...