CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Cryptography: Theory and Practice
Cryptography: Theory and Practice
Identity-Based Encryption from the Weil Pairing
SIAM Journal on Computing
Generalized Secret Sharing and Monotone Functions
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
Efficient Trace and Revoke Schemes
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Quantifying information leakage in document redaction
Proceedings of the 1st ACM workshop on Hardcopy document processing
Entity quick click: rapid text copying based on automatic entity extraction
CHI '06 Extended Abstracts on Human Factors in Computing Systems
Revisiting the uniqueness of simple demographics in the US population
Proceedings of the 5th ACM workshop on Privacy in electronic society
Attribute-based encryption for fine-grained access control of encrypted data
Proceedings of the 13th ACM conference on Computer and communications security
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
A forward-secure public-key encryption scheme
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Entity workspace: an evidence file that aids memory, inference, and reading
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
Collusion resistant broadcast encryption with short ciphertexts and private keys
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Fuzzy identity-based encryption
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Conjunctive Broadcast and Attribute-Based Encryption
Pairing '09 Proceedings of the 3rd International Conference Palo Alto on Pairing-Based Cryptography
Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes
Cryptography and Coding '09 Proceedings of the 12th IMA International Conference on Cryptography and Coding
Attribute-based encryption without key cloning
International Journal of Applied Cryptography
Attribute-based encryption without key cloning
International Journal of Applied Cryptography
Towards attribute revocation in key-policy attribute based encryption
CANS'11 Proceedings of the 10th international conference on Cryptology and Network Security
Fine-grained user access control in ciphertext-policy attribute-based encryption
Security and Communication Networks
CoBAn: A context based model for data leakage prevention
Information Sciences: an International Journal
Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
IEEE/ACM Transactions on Networking (TON)
Toward strong, usable access control for shared distributed data
FAST'14 Proceedings of the 12th USENIX conference on File and Storage Technologies
Hi-index | 0.00 |
Protecting identity in the Internet age requires the ability to go beyond the identification of explicitly identifying information like social security numbers, to also find the broadly-held attributes that, when taken together, are identifying. We present a system that can work in conjunction with natural language processing algorithms or user-generated tags, to protect identifying attributes in text. The system uses a new attribute-based encryption protocol to control access to such identifying attributes and thus protects identity. The system supports the definition of user access rights based on role or identity. We extend the existing model of attribute-based encryption to support threshold access rights and provide a heuristic instantiation of revocation.