TY - JOUR
T1 - Purified Authorization Service With Encrypted Message Moderation
AU - Jiang, Peng
AU - Liu, Qi
AU - Zhu, Liehuang
N1 - Publisher Copyright:
© 2005-2012 IEEE.
PY - 2024
Y1 - 2024
N2 - Access control encryption enables access control on both senders and receivers, and enhances message sanitization compared with traditionally cryptographic access control mechanisms. However, it is usually built on top of encrypted messages, which makes it difficult to identify malicious data and amplifies abusive message transmission. Message franking and source tracing mechanisms facilitate a report of abusive messages while support only plain-data moderation in end-to-end encryption. In this work, we present sMAC, a purified access control framework which supports both sanitization and moderation over the encrypted messages. It enables security of the data privacy, sender anonymity and backward security. We instantiate it by proposing a cryptographic primitive named amenable ACE, which expands the message accountability algorithm module in addition to access control encryption. We give formal security proof of amenable ACE in the standard model. The experimental results show that amenable ACE is efficient where computational costs of textsf {Decrypt} , textsf {Stamp} , textsf {Verify} and textsf {Inspect} are independent of the message size.
AB - Access control encryption enables access control on both senders and receivers, and enhances message sanitization compared with traditionally cryptographic access control mechanisms. However, it is usually built on top of encrypted messages, which makes it difficult to identify malicious data and amplifies abusive message transmission. Message franking and source tracing mechanisms facilitate a report of abusive messages while support only plain-data moderation in end-to-end encryption. In this work, we present sMAC, a purified access control framework which supports both sanitization and moderation over the encrypted messages. It enables security of the data privacy, sender anonymity and backward security. We instantiate it by proposing a cryptographic primitive named amenable ACE, which expands the message accountability algorithm module in addition to access control encryption. We give formal security proof of amenable ACE in the standard model. The experimental results show that amenable ACE is efficient where computational costs of textsf {Decrypt} , textsf {Stamp} , textsf {Verify} and textsf {Inspect} are independent of the message size.
KW - Message moderation
KW - access control encryption
KW - message franking
KW - source tracing
UR - http://www.scopus.com/inward/record.url?scp=85191341287&partnerID=8YFLogxK
U2 - 10.1109/TIFS.2024.3393391
DO - 10.1109/TIFS.2024.3393391
M3 - Article
AN - SCOPUS:85191341287
SN - 1556-6013
VL - 19
SP - 5196
EP - 5206
JO - IEEE Transactions on Information Forensics and Security
JF - IEEE Transactions on Information Forensics and Security
ER -