For the current REF see the REF 2021 website REF 2021 logo

Output details

11 - Computer Science and Informatics

University of Bristol

Return to search Previous output Next output
Output 0 of 0 in the submission
Article title

Security Analysis of Cryptographically Controlled Access to XML Documents

Type
D - Journal article
DOI
-
Title of journal
Journal of the ACM
Article number
-
Volume number
55(2)
Issue number
-
First page of article
108
ISSN of journal
0004-5411
Year of publication
2008
Number of additional authors
1
Additional information

<19> This paper forms part of a body of work of Warinschi on "computational soundness", which is the main technique to match up the methodologies of provable security and formal techniques. The paper, explains, for the first time, how to apply the techniques of computational soundness to access control schemes used in the field of semi-structured databases.

This output accounts for more realistic attackers than pre-2008 conference proceeding. The new attacks deal with information an attacker may infer from encrypted documents and with more realistic attacker abilities. It investigates a more powerful adversary (capable of "selective-decryption" attacks) and explains why defeating this adversary is impossible, given the state-of-the-art cryptography.

The output's new extensions need tailored definitions, constructions, theorems and proofs. Furthermore, the discussion and details are more extensive than in the conference version. The major new technical contributions over the conference version are in Section 5 (and include Definition-4, Theorems 5&7) and in Appendix.

Interdisciplinary
-
Cross-referral requested
-
Research group
A - Cryptography Group
Citation count
8
Proposed double-weighted
No
Double-weighted statement
-
Reserve for a double-weighted output
No
Non-English
No
English abstract
-