{"id":"https://openalex.org/W4414869212","doi":"https://doi.org/10.62056/akmpxrdja","title":"Post-Quantum Access Control with Application to Secure Data Retrieval","display_name":"Post-Quantum Access Control with Application to Secure Data Retrieval","publication_year":2025,"publication_date":"2025-10-06","ids":{"openalex":"https://openalex.org/W4414869212","doi":"https://doi.org/10.62056/akmpxrdja"},"language":"en","primary_location":{"id":"doi:10.62056/akmpxrdja","is_oa":true,"landing_page_url":"https://doi.org/10.62056/akmpxrdja","pdf_url":"https://cic.iacr.org/p/2/3/20/pdf","source":{"id":"https://openalex.org/S4394708374","display_name":"IACR Communications in Cryptology","issn_l":"3006-5496","issn":["3006-5496"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320989","host_organization_name":"International Association for Cryptologic Research","host_organization_lineage":["https://openalex.org/P4310320989"],"host_organization_lineage_names":["International Association for Cryptologic Research"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Communications in Cryptology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://cic.iacr.org/p/2/3/20/pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051006664","display_name":"Behzad Abdolmaleki","orcid":"https://orcid.org/0009-0008-8335-2787"},"institutions":[{"id":"https://openalex.org/I91136226","display_name":"University of Sheffield","ror":"https://ror.org/05krs5044","country_code":"GB","type":"education","lineage":["https://openalex.org/I91136226"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Behzad Abdolmaleki","raw_affiliation_strings":["University of Sheffield"],"affiliations":[{"raw_affiliation_string":"University of Sheffield","institution_ids":["https://openalex.org/I91136226"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5119867131","display_name":"Hannes Bl\u00fcmel","orcid":null},"institutions":[{"id":"https://openalex.org/I4210113131","display_name":"Barkhausen Institut","ror":"https://ror.org/0260qqv98","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210113131"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Hannes Bl\u00fcmel","raw_affiliation_strings":["Barkhausen Institut"],"affiliations":[{"raw_affiliation_string":"Barkhausen Institut","institution_ids":["https://openalex.org/I4210113131"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008122874","display_name":"Tianxiang Dai","orcid":"https://orcid.org/0009-0002-7968-2499"},"institutions":[{"id":"https://openalex.org/I67415387","display_name":"Lancaster University","ror":"https://ror.org/04f2nsd36","country_code":"GB","type":"education","lineage":["https://openalex.org/I67415387"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Tianxiang Dai","raw_affiliation_strings":["Lancaster University Leipzig"],"affiliations":[{"raw_affiliation_string":"Lancaster University Leipzig","institution_ids":["https://openalex.org/I67415387"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5095913380","display_name":"Giacomo Fenzi","orcid":"https://orcid.org/0000-0003-3702-1780"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Giacomo Fenzi","raw_affiliation_strings":["EPFL"],"affiliations":[{"raw_affiliation_string":"EPFL","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042808392","display_name":"Homa Khajeh","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Homa Khajeh","raw_affiliation_strings":["Independent researcher"],"affiliations":[{"raw_affiliation_string":"Independent researcher","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073873169","display_name":"Stefan K\u00f6psell","orcid":"https://orcid.org/0000-0002-0466-562X"},"institutions":[{"id":"https://openalex.org/I4210113131","display_name":"Barkhausen Institut","ror":"https://ror.org/0260qqv98","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210113131"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Stefan K\u00f6psell","raw_affiliation_strings":["Barkhausen Institut"],"affiliations":[{"raw_affiliation_string":"Barkhausen Institut","institution_ids":["https://openalex.org/I4210113131"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005726919","display_name":"Maryam Zarezadeh","orcid":null},"institutions":[{"id":"https://openalex.org/I4210113131","display_name":"Barkhausen Institut","ror":"https://ror.org/0260qqv98","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210113131"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Maryam Zarezadeh","raw_affiliation_strings":["Barkhausen Institut"],"affiliations":[{"raw_affiliation_string":"Barkhausen Institut","institution_ids":["https://openalex.org/I4210113131"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5051006664"],"corresponding_institution_ids":["https://openalex.org/I91136226"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.1474476,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2","issue":"3","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.8050000071525574},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.6974999904632568},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5756000280380249},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.5073000192642212},{"id":"https://openalex.org/keywords/data-access","display_name":"Data access","score":0.43689998984336853},{"id":"https://openalex.org/keywords/access-structure","display_name":"Access structure","score":0.421099990606308},{"id":"https://openalex.org/keywords/xacml","display_name":"XACML","score":0.3935000002384186},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.3873000144958496},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.38499999046325684}],"concepts":[{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.8050000071525574},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7396000027656555},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.6974999904632568},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5756000280380249},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.5073000192642212},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.43689998984336853},{"id":"https://openalex.org/C2778950925","wikidata":"https://www.wikidata.org/wiki/Q4672474","display_name":"Access structure","level":4,"score":0.421099990606308},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.4027999937534332},{"id":"https://openalex.org/C2779886121","wikidata":"https://www.wikidata.org/wiki/Q288682","display_name":"XACML","level":3,"score":0.3935000002384186},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.3873000144958496},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.38499999046325684},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.358599990606308},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.3521000146865845},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.34860000014305115},{"id":"https://openalex.org/C551230270","wikidata":"https://www.wikidata.org/wiki/Q4368942","display_name":"Data retrieval","level":2,"score":0.3370000123977661},{"id":"https://openalex.org/C44415380","wikidata":"https://www.wikidata.org/wiki/Q17008721","display_name":"Computer access control","level":3,"score":0.334199994802475},{"id":"https://openalex.org/C48814466","wikidata":"https://www.wikidata.org/wiki/Q1228590","display_name":"Discretionary access control","level":4,"score":0.3140000104904175},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.30239999294281006},{"id":"https://openalex.org/C2781462938","wikidata":"https://www.wikidata.org/wiki/Q5062195","display_name":"Centralized database","level":2,"score":0.2825999855995178},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.27900001406669617},{"id":"https://openalex.org/C70061542","wikidata":"https://www.wikidata.org/wiki/Q989016","display_name":"Distributed database","level":2,"score":0.27489998936653137},{"id":"https://openalex.org/C70000936","wikidata":"https://www.wikidata.org/wiki/Q4672467","display_name":"Access method","level":2,"score":0.2671000063419342},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.2653000056743622},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.2624000012874603}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.62056/akmpxrdja","is_oa":true,"landing_page_url":"https://doi.org/10.62056/akmpxrdja","pdf_url":"https://cic.iacr.org/p/2/3/20/pdf","source":{"id":"https://openalex.org/S4394708374","display_name":"IACR Communications in Cryptology","issn_l":"3006-5496","issn":["3006-5496"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320989","host_organization_name":"International Association for Cryptologic Research","host_organization_lineage":["https://openalex.org/P4310320989"],"host_organization_lineage_names":["International Association for Cryptologic Research"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Communications in Cryptology","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.62056/akmpxrdja","is_oa":true,"landing_page_url":"https://doi.org/10.62056/akmpxrdja","pdf_url":"https://cic.iacr.org/p/2/3/20/pdf","source":{"id":"https://openalex.org/S4394708374","display_name":"IACR Communications in Cryptology","issn_l":"3006-5496","issn":["3006-5496"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320989","host_organization_name":"International Association for Cryptologic Research","host_organization_lineage":["https://openalex.org/P4310320989"],"host_organization_lineage_names":["International Association for Cryptologic Research"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Communications in Cryptology","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320329018","display_name":"Ethereum Foundation","ror":null}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4414869212.pdf"},"referenced_works_count":76,"referenced_works":["https://openalex.org/W24999078","https://openalex.org/W139740867","https://openalex.org/W644599125","https://openalex.org/W1597151159","https://openalex.org/W1837145606","https://openalex.org/W1838911907","https://openalex.org/W1971053366","https://openalex.org/W2023951105","https://openalex.org/W2040168265","https://openalex.org/W2110264892","https://openalex.org/W2125858711","https://openalex.org/W2132089379","https://openalex.org/W2138341340","https://openalex.org/W2141420453","https://openalex.org/W2145921607","https://openalex.org/W2157778124","https://openalex.org/W2167236842","https://openalex.org/W2291392164","https://openalex.org/W2535199873","https://openalex.org/W2536319456","https://openalex.org/W2597461547","https://openalex.org/W2599930814","https://openalex.org/W2610828328","https://openalex.org/W2725609086","https://openalex.org/W2768298226","https://openalex.org/W2798594784","https://openalex.org/W2802501897","https://openalex.org/W2883748642","https://openalex.org/W2885314357","https://openalex.org/W2888978899","https://openalex.org/W2932503745","https://openalex.org/W2952881078","https://openalex.org/W2953327827","https://openalex.org/W2963715339","https://openalex.org/W2968027060","https://openalex.org/W2976210587","https://openalex.org/W2990391002","https://openalex.org/W2991016858","https://openalex.org/W3029445927","https://openalex.org/W3031135807","https://openalex.org/W3037467273","https://openalex.org/W3048164239","https://openalex.org/W3084272429","https://openalex.org/W3093702153","https://openalex.org/W3100960533","https://openalex.org/W3108103136","https://openalex.org/W3119629092","https://openalex.org/W3168341498","https://openalex.org/W3204983216","https://openalex.org/W3216987697","https://openalex.org/W4213051497","https://openalex.org/W4253103663","https://openalex.org/W4288057739","https://openalex.org/W4288057784","https://openalex.org/W4294698958","https://openalex.org/W4312944809","https://openalex.org/W4313042292","https://openalex.org/W4362590391","https://openalex.org/W4378527334","https://openalex.org/W4384948596","https://openalex.org/W4385654262","https://openalex.org/W4385654747","https://openalex.org/W4386875763","https://openalex.org/W4390660113","https://openalex.org/W4391259666","https://openalex.org/W4394850647","https://openalex.org/W4399381725","https://openalex.org/W4400120632","https://openalex.org/W4400350864","https://openalex.org/W4401598481","https://openalex.org/W4401598741","https://openalex.org/W4401598833","https://openalex.org/W4401692616","https://openalex.org/W4401752116","https://openalex.org/W4401752900","https://openalex.org/W4410134354"],"related_works":[],"abstract_inverted_index":{"Servan-Schreiber":[0],"et":[1,79],"al.":[2],"[IEEE":[3],"S&amp;":[4],"P,":[5],"2023]":[6],"presented":[7],"a":[8,57,130,159],"new":[9],"notion":[10],"called":[11],"private":[12],"access":[13,101,151,167],"control":[14,102,152],"lists":[15],"(PACL)":[16],"for":[17,84,150,166],"function":[18],"secret":[19,64],"sharing":[20,65],"(FSS),":[21],"where":[22],"the":[23,29,36,52,68,77,85,90,112,119,138,171],"FSS":[24,30,107,113],"evaluators":[25],"can":[26],"ensure":[27],"that":[28,99,111],"dealer":[31,114],"is":[32,48,115],"authorized":[33,116],"to":[34,117],"share":[35,118],"given":[37],"function.":[38,123],"Their":[39],"construction":[40,58,75,146],"relies":[41],"on":[42,89,142],"costly":[43],"non-interactive":[44],"secret-shared":[45],"proofs":[46],"and":[47,134],"not":[49],"secure":[50,160],"in":[51],"post-quantum":[53,86],"setting.":[54],"We":[55,156],"give":[56],"of":[59,126],"PACL":[60,128,172],"from":[61],"publicly":[62],"verifiable":[63],"(PVSS)":[66],"under":[67],"short":[69],"integer":[70],"solution":[71],"(SIS)":[72],"problem.":[73],"Our":[74],"adapts":[76],"Gentry":[78],"al.'s":[80],"scheme":[81,163],"[EUROCRYPT,":[82],"2022]":[83],"setting":[87],"based":[88],"learning":[91],"with":[92],"error":[93],"(LWE)":[94],"assumption":[95],"aimed":[96],"at":[97],"ensuring":[98],"database":[100,121],"policies":[103],"are":[104],"enforced":[105],"by":[106,153],"evaluators,":[108],"who":[109],"verify":[110],"specified":[120],"query":[122],"The":[124],"benchmarks":[125],"our":[127],"show":[129],"trade-off":[131],"between":[132],"proving":[133],"verification":[135],"efficiency,":[136],"making":[137],"optimal":[139],"choice":[140],"dependent":[141],"application":[143],"requirements.":[144],"This":[145],"has":[147],"many":[148],"applications":[149],"applying":[154],"FSS.":[155],"also":[157],"present":[158],"data":[161],"retrieval":[162],"using":[164],"DPF-PACL":[165],"control,":[168],"which":[169],"complements":[170],"framework":[173],"while":[174],"providing":[175],"independent":[176],"utility.":[177]},"counts_by_year":[],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
