Access control using pairing based cryptography

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

51 Citations (Scopus)


We present a mechanism to encrypt to an arbitrary collection of identities using a variant of the Boneh-Franklin identity based encryption scheme. The decryptor is defined by a logical formulae of conjunctions and disjunctions. This enables a simple mechanism to drive access control to broadcast encrypted data using user identities as the public keys.
Original languageEnglish
Title of host publicationTopics in Cryptology - CT-RSA 2003
PublisherSpringer Berlin Heidelberg
Pages111 - 121
Number of pages10
Publication statusPublished - Apr 2003

Bibliographical note

Conference Proceedings/Title of Journal: Proceedings CT-RSA 2003

Fingerprint Dive into the research topics of 'Access control using pairing based cryptography'. Together they form a unique fingerprint.

  • Cite this

    Smart, NP. (2003). Access control using pairing based cryptography. In Topics in Cryptology - CT-RSA 2003 (Vol. 2612, pp. 111 - 121). Springer Berlin Heidelberg.