13.07.2015 Views

A cryptographic solution for general access control - University of ...

A cryptographic solution for general access control - University of ...

A cryptographic solution for general access control - University of ...

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

466 Yibing Kong et al.(c) A Decryption function D: m = D K −1(c), where K −1 means private key(decryption key).• A Modulus Generator MG: ∀s i ∈ S, MG generates a modulus n si , such thatn s1 ,n s2 , ..., n sl are pairwise relatively prime. Please note, these moduli arepublicly known and will be used as the CRT moduli.• A Shared DataBase (or file system) SDB that stores shared data.4.3 Cryptographic Access ControlOur data based <strong>solution</strong> is depicted by a scenario as follows. Assume that a subjects i wants to share a message m with k subjects s i1 ,s i2 , ..., s ik ∈ S, s i per<strong>for</strong>msthe following operations (<strong>for</strong> simplicity, we assume that m

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!