. The rapid growth of the digital economy makes (cid:28)ne-grained access control more and more challenging. One of the most im- pacted areas is cloud computing, which for security purposes requires cryptographic access control. Currently, the best solution for that is the use of Attribute-based Cryptography, which allows the de(cid:28)nition of access policies, based on the attributes of entities. Unfortunately, this family of schemes comes along with a signi(cid:28)cant drawback, speci(cid:28)cally the required user-side computation is growing with the growth of the complexity of the access policy. We provide a concept, called Formal Language Identity-based Cryptography, which gives a solution to this problem, making (cid:28)ne- grained cryptographic access control practical.
{"title":"Formal Language Identity-based Cryptography","authors":"Ádám Vécsi, A. Pethő","doi":"10.21857/y54jofkjdm","DOIUrl":"https://doi.org/10.21857/y54jofkjdm","url":null,"abstract":". The rapid growth of the digital economy makes (cid:28)ne-grained access control more and more challenging. One of the most im- pacted areas is cloud computing, which for security purposes requires cryptographic access control. Currently, the best solution for that is the use of Attribute-based Cryptography, which allows the de(cid:28)nition of access policies, based on the attributes of entities. Unfortunately, this family of schemes comes along with a signi(cid:28)cant drawback, speci(cid:28)cally the required user-side computation is growing with the growth of the complexity of the access policy. We provide a concept, called Formal Language Identity-based Cryptography, which gives a solution to this problem, making (cid:28)ne- grained cryptographic access control practical.","PeriodicalId":375959,"journal":{"name":"Sv. 25(2021)=knj. 60","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132054516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of encryption schemes in modern ransomware","authors":"Roderik Ploszek, P. Švec, Patrik Debnár","doi":"10.21857/mnlqgc58gy","DOIUrl":"https://doi.org/10.21857/mnlqgc58gy","url":null,"abstract":"","PeriodicalId":375959,"journal":{"name":"Sv. 25(2021)=knj. 60","volume":"421 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126709340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On weak rotors, Latin squares, linear algebraic representations, invariant differentials and cryptanalysis of Enigma","authors":"N. Courtois, M. Grajek, M. Rams","doi":"10.21857/y26kec4k89","DOIUrl":"https://doi.org/10.21857/y26kec4k89","url":null,"abstract":"","PeriodicalId":375959,"journal":{"name":"Sv. 25(2021)=knj. 60","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130416126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new representation of S-boxes for algebraic differential cryptanalysis","authors":"A. Bednáriková, Pavol Zajac","doi":"10.21857/yvjrdcl0ey","DOIUrl":"https://doi.org/10.21857/yvjrdcl0ey","url":null,"abstract":"","PeriodicalId":375959,"journal":{"name":"Sv. 25(2021)=knj. 60","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130944065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Musipher: Hiding information in music composition","authors":"P. Špaček, Pavol Sobota","doi":"10.21857/yvjrdcl04y","DOIUrl":"https://doi.org/10.21857/yvjrdcl04y","url":null,"abstract":"","PeriodicalId":375959,"journal":{"name":"Sv. 25(2021)=knj. 60","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126568940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}