GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Overview and Considerations of Access Control Based on Attribute Encryption

Traditional public-key encryption (PKE) requires different data to have different keys that – along with the encrypted version of the data – can be distributed to users who satisfy access control policies.

With user-specific keys, the communication complexity is linear to the number of users, and pre-distributed keys are neither bound to the attributes of users and data nor to the respective access control policy.

  • Author(s):
  • Vincent C. Hu
  • Share this:
  • Share on Facebook
  • Share on Twitter
  • Share via Email
  • Share on LinkedIn
Overview and Considerations of Access Control Based on Attribute Encryption
Format:
  • White Paper
Topics:
Website:Visit Publisher Website
Publisher:National Institute of Standards and Technology (NIST)
Published:December 20, 2023
License:Public Domain

Featured Content

Contact Publisher

Claim Content