Not a very interesting episode except for the part on "Predicate Encryption". I think the seminal work in this area is http://eprint.iacr.org/2007/404
I don't understand how this is any different from general access control lists. True, since the data is encrypted, even if someone gets access to the entire data, they can only access the part they are authorized to access, but a software layer enforcing access control lists also essentially enforces the same semantics.
Thursday, June 12, 2008
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment