Policy-Based Cryptography and Applications
Author(s) -
Walid Bagga,
Refik Molva
Publication year - 2005
Publication title -
lecture notes in computer science
Language(s) - English
Resource type - Book series
SCImago Journal Rank - 0.249
H-Index - 400
eISSN - 1611-3349
pISSN - 0302-9743
ISBN - 3-540-26656-9
DOI - 10.1007/11507840_7
Subject(s) - encryption , computer science , cryptography , credential , computer security , theoretical computer science , signature (topology) , cryptographic primitive , bilinear interpolation , enforcement , cryptographic protocol , mathematics , political science , law , computer vision , geometry
In this paper, we introduce the concept of policy-based cryptography which makes it possible to perform policy enforcement in large-scale open environments like the Internet, while respecting the data minimization principle according to which only strictly necessary information should be collected for a given purpose. We propose concrete policy-based encryption and signature schemes, based on bilinear pairings, which allow performing relatively efficient encryption and signature operations with respect to credential-based policies formalized as boolean expressions written in generic conjunctive-disjunctive normal form. We illustrate the privacy properties of our policy-based cryptographic schemes through the description of three application scenarios.
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom