Presentation 2013-07-18
A Hierarchical Access Control Method by the Secret Sharing Scheme
Takashi KURAKAMI, Masaaki FUJIYOSHI, Hitoshi KIYA,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) This paper studies a new concept of access control which is referred to as hierarchical access control. A hierar-chical access control method not only controls access to existing secret information but also controls access to new secret information derived from existing secret information. Secure computation on existing secret information produces new secret information, whereas the computation keeps existing secret information secure. In addition, different access control rules are applied to existing secret information and to new computed secret information, whereas conventional access control with secure computation controls access to both information by only one rule. The proposed hierarchical access control method is based on (k, n)-threshold secret sharing.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) homomorphism / secure computation / privacy preserving / contents protection / access control policy / trusted third party
Paper # ISEC2013-26,SITE2013-21,ICSS2013-31,EMM2013-28
Date of Issue

Conference Information
Committee SITE
Conference Date 2013/7/11(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Social Implications of Technology and Information Ethics (SITE)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) A Hierarchical Access Control Method by the Secret Sharing Scheme
Sub Title (in English)
Keyword(1) homomorphism
Keyword(2) secure computation
Keyword(3) privacy preserving
Keyword(4) contents protection
Keyword(5) access control policy
Keyword(6) trusted third party
1st Author's Name Takashi KURAKAMI
1st Author's Affiliation Department of Information and Communication Systems, Tokyo Metropolitan University()
2nd Author's Name Masaaki FUJIYOSHI
2nd Author's Affiliation Department of Information and Communication Systems, Tokyo Metropolitan University
3rd Author's Name Hitoshi KIYA
3rd Author's Affiliation Department of Information and Communication Systems, Tokyo Metropolitan University
Date 2013-07-18
Paper # ISEC2013-26,SITE2013-21,ICSS2013-31,EMM2013-28
Volume (vol) vol.113
Number (no) 136
Page pp.pp.-
#Pages 6
Date of Issue