Oblivious transfer with hidden access control and outsourced decryption from deterministic finite automata‐based functional encryption for an in‐vehicle sensor database system

Author(s):  
Abubaker Wahaballa ◽  
Zhiguang Qin ◽  
Hisham Abdalla ◽  
Majdi Abdellatief ◽  
Mohamed A. Elfaki
Author(s):  
Benoît Libert ◽  
San Ling ◽  
Fabrice Mouhartem ◽  
Khoa Nguyen ◽  
Huaxiong Wang

2013 ◽  
Vol 380-384 ◽  
pp. 1947-1950
Author(s):  
Xin Yu Mao

Constructing the tree type logic structure of a file and introducing the view mechanism of database system into the file system, the hierarchical structure of view files is created. Different files ( view files ) are provided to different users according to their levels or interests by mapping layer by layer with beginning of the minimum access unit (the logic block). It can solve the problem of the discrepancy of users views.


2003 ◽  
Vol 87 (4) ◽  
pp. 187-193
Author(s):  
Jean H. Gallier ◽  
Salvatore La Torre ◽  
Supratik Mukhopadhyay

2017 ◽  
Vol 91 (4) ◽  
pp. 874-886 ◽  
Author(s):  
Xiaoguang Han ◽  
Zengqiang Chen ◽  
Zhongxin Liu ◽  
Qing Zhang

2020 ◽  
Vol 2020 ◽  
pp. 1-11
Author(s):  
Bo Mi ◽  
Ping Long ◽  
Yang Liu ◽  
Fengtian Kuang

Data deduplication serves as an effective way to optimize the storage occupation and the bandwidth consumption over clouds. As for the security of deduplication mechanism, users’ privacy and accessibility are of utmost concern since data are outsourced. However, the functionality of redundancy removal and the indistinguishability of deduplication labels are naturally incompatible, which bring about a lot of threats on data security. Besides, the access control of sharing copies may lead to infringement on users’ attributes and cumbersome query overheads. To balance the usability with the confidentiality of deduplication labels and securely realize an elaborate access structure, a novel data deduplication scheme is proposed in this paper. Briefly speaking, we drew support from learning with errors (LWE) to make sure that the deduplication labels are only differentiable during the duplication check process. Instead of authority matching, the proof of ownership (PoW) is then implemented under the paradigm of inner production. Since the deduplication label is light-weighted and the inner production is easy to carry out, our scheme is more efficient in terms of computation and storage. Security analysis also indicated that the deduplication labels are distinguishable only for duplication check, and the probability of falsifying a valid ownership is negligible.


Sign in / Sign up

Export Citation Format

Share Document