Paper 2022/1615

Efficient Methods for Implementation of Generalized Access Structures

James Smith
Abstract

The recent advent of cloud computing and IoT has made it imperative to store huge amount of data in the cloud servers. Enormous amount of data is also stored in the servers of big organizations. In organizations, it is not desirable for every member to have equal privileges to access the stored data. Threshold secret sharing schemes are widely used for implementing such access control mechanisms. The access privileges of the members also vary from one data packet to another. While implementing such dynamic access structures using threshold secret sharing schemes, the key management becomes too complex to be implemented in real time. Furthermore, the storage of the users’ access privileges requires exponential space (O($2^n$)) and its implementation requires exponential time. In this paper, the algorithms proposed to tackle the problems of priority based access control and authentication require a space complexity of O($n^2$) and a time complexity of O($n$), where n is the number of users. In the practical scenario, such space can easily be provided on the servers and the algorithms can run smoothly in real time.

Metadata
Available format(s)
PDF
Category
Applications
Publication info
Preprint.
Keywords
Generlized Access Control Access Structures Generalized Secret Sharing
Contact author(s)
james o smith732 @ gmail com
History
2022-11-21: approved
2022-11-20: received
See all versions
Short URL
https://ia.cr/2022/1615
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2022/1615,
      author = {James Smith},
      title = {Efficient Methods for Implementation of Generalized Access Structures},
      howpublished = {Cryptology {ePrint} Archive, Paper 2022/1615},
      year = {2022},
      url = {https://eprint.iacr.org/2022/1615}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.