{"title":"Formal Language Identity-based Cryptography","authors":"Ádám Vécsi, A. Pethő","doi":"10.21857/y54jofkjdm","DOIUrl":null,"url":null,"abstract":". The rapid growth of the digital economy makes (cid:28)ne-grained access control more and more challenging. One of the most im- pacted areas is cloud computing, which for security purposes requires cryptographic access control. Currently, the best solution for that is the use of Attribute-based Cryptography, which allows the de(cid:28)nition of access policies, based on the attributes of entities. Unfortunately, this family of schemes comes along with a signi(cid:28)cant drawback, speci(cid:28)cally the required user-side computation is growing with the growth of the complexity of the access policy. We provide a concept, called Formal Language Identity-based Cryptography, which gives a solution to this problem, making (cid:28)ne- grained cryptographic access control practical.","PeriodicalId":375959,"journal":{"name":"Sv. 25(2021)=knj. 60","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Sv. 25(2021)=knj. 60","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21857/y54jofkjdm","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
. The rapid growth of the digital economy makes (cid:28)ne-grained access control more and more challenging. One of the most im- pacted areas is cloud computing, which for security purposes requires cryptographic access control. Currently, the best solution for that is the use of Attribute-based Cryptography, which allows the de(cid:28)nition of access policies, based on the attributes of entities. Unfortunately, this family of schemes comes along with a signi(cid:28)cant drawback, speci(cid:28)cally the required user-side computation is growing with the growth of the complexity of the access policy. We provide a concept, called Formal Language Identity-based Cryptography, which gives a solution to this problem, making (cid:28)ne- grained cryptographic access control practical.