{"title":"基于形式语言身份的密码学","authors":"Ádám Vécsi, A. Pethő","doi":"10.21857/y54jofkjdm","DOIUrl":null,"url":null,"abstract":". The rapid growth of the digital economy makes (cid:28)ne-grained access control more and more challenging. One of the most im- pacted areas is cloud computing, which for security purposes requires cryptographic access control. Currently, the best solution for that is the use of Attribute-based Cryptography, which allows the de(cid:28)nition of access policies, based on the attributes of entities. Unfortunately, this family of schemes comes along with a signi(cid:28)cant drawback, speci(cid:28)cally the required user-side computation is growing with the growth of the complexity of the access policy. We provide a concept, called Formal Language Identity-based Cryptography, which gives a solution to this problem, making (cid:28)ne- grained cryptographic access control practical.","PeriodicalId":375959,"journal":{"name":"Sv. 25(2021)=knj. 60","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Formal Language Identity-based Cryptography\",\"authors\":\"Ádám Vécsi, A. Pethő\",\"doi\":\"10.21857/y54jofkjdm\",\"DOIUrl\":null,\"url\":null,\"abstract\":\". The rapid growth of the digital economy makes (cid:28)ne-grained access control more and more challenging. One of the most im- pacted areas is cloud computing, which for security purposes requires cryptographic access control. Currently, the best solution for that is the use of Attribute-based Cryptography, which allows the de(cid:28)nition of access policies, based on the attributes of entities. Unfortunately, this family of schemes comes along with a signi(cid:28)cant drawback, speci(cid:28)cally the required user-side computation is growing with the growth of the complexity of the access policy. We provide a concept, called Formal Language Identity-based Cryptography, which gives a solution to this problem, making (cid:28)ne- grained cryptographic access control practical.\",\"PeriodicalId\":375959,\"journal\":{\"name\":\"Sv. 25(2021)=knj. 60\",\"volume\":\"35 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-08-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Sv. 25(2021)=knj. 60\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.21857/y54jofkjdm\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Sv. 25(2021)=knj. 60","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21857/y54jofkjdm","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
. The rapid growth of the digital economy makes (cid:28)ne-grained access control more and more challenging. One of the most im- pacted areas is cloud computing, which for security purposes requires cryptographic access control. Currently, the best solution for that is the use of Attribute-based Cryptography, which allows the de(cid:28)nition of access policies, based on the attributes of entities. Unfortunately, this family of schemes comes along with a signi(cid:28)cant drawback, speci(cid:28)cally the required user-side computation is growing with the growth of the complexity of the access policy. We provide a concept, called Formal Language Identity-based Cryptography, which gives a solution to this problem, making (cid:28)ne- grained cryptographic access control practical.