Presentation | 2013-07-18 A Hierarchical Access Control Method by the Secret Sharing Scheme Takashi KURAKAMI, Masaaki FUJIYOSHI, Hitoshi KIYA, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | This paper studies a new concept of access control which is referred to as hierarchical access control. A hierar-chical access control method not only controls access to existing secret information but also controls access to new secret information derived from existing secret information. Secure computation on existing secret information produces new secret information, whereas the computation keeps existing secret information secure. In addition, different access control rules are applied to existing secret information and to new computed secret information, whereas conventional access control with secure computation controls access to both information by only one rule. The proposed hierarchical access control method is based on (k, n)-threshold secret sharing. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | homomorphism / secure computation / privacy preserving / contents protection / access control policy / trusted third party |
Paper # | ISEC2013-26,SITE2013-21,ICSS2013-31,EMM2013-28 |
Date of Issue |
Conference Information | |
Committee | SITE |
---|---|
Conference Date | 2013/7/11(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Social Implications of Technology and Information Ethics (SITE) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | A Hierarchical Access Control Method by the Secret Sharing Scheme |
Sub Title (in English) | |
Keyword(1) | homomorphism |
Keyword(2) | secure computation |
Keyword(3) | privacy preserving |
Keyword(4) | contents protection |
Keyword(5) | access control policy |
Keyword(6) | trusted third party |
1st Author's Name | Takashi KURAKAMI |
1st Author's Affiliation | Department of Information and Communication Systems, Tokyo Metropolitan University() |
2nd Author's Name | Masaaki FUJIYOSHI |
2nd Author's Affiliation | Department of Information and Communication Systems, Tokyo Metropolitan University |
3rd Author's Name | Hitoshi KIYA |
3rd Author's Affiliation | Department of Information and Communication Systems, Tokyo Metropolitan University |
Date | 2013-07-18 |
Paper # | ISEC2013-26,SITE2013-21,ICSS2013-31,EMM2013-28 |
Volume (vol) | vol.113 |
Number (no) | 136 |
Page | pp.pp.- |
#Pages | 6 |
Date of Issue |