Fast Probabilistic Algorithms for Verification of Polynomial Identities
Journal of the ACM (JACM)
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Attribute-based encryption for fine-grained access control of encrypted data
Proceedings of the 13th ACM conference on Computer and communications security
Ciphertext-Policy Attribute-Based Encryption
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
Persona: an online social network with user-defined privacy
Proceedings of the ACM SIGCOMM 2009 conference on Data communication
Lower bounds for discrete logarithms and related problems
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Achieving secure, scalable, and fine-grained data access control in cloud computing
INFOCOM'10 Proceedings of the 29th conference on Information communications
Attribute-Based Messaging: Access Control and Confidentiality
ACM Transactions on Information and System Security (TISSEC)
Fuzzy identity-based encryption
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Hi-index | 0.00 |
Making friends by sharing personal data has become popular in online social networks (OSNs). Security is a major concern, as an OSN service provider (OSN-SP) is semi-trusted and for-profit, while malicious users might also gather data for improper uses. Encryption of data is a straightforward solution, but interactive sharing of encrypted data becomes a challenging task. In this paper, we propose Masque, a novel access control mechanism employing attribute-based encryption (ABE), as a hierarchical solution for interactive sharing of encrypted data in OSNs. Based on key-policy ABE, it allows the OSN-SP to manage users at a high level but without being able to access their sensitive data. At the same time, based on ciphertext-policy ABE, it enables users to customize their own access policies specifically.