scispace - formally typeset
D

Deholo Nali

Researcher at University of Ottawa

Publications -  7
Citations -  72

Deholo Nali is an academic researcher from University of Ottawa. The author has contributed to research in topics: On-the-fly encryption & Encryption. The author has an hindex of 4, co-authored 7 publications receiving 70 citations.

Papers
More filters
Journal ArticleDOI

Using Threshold Attribute-Based Encryption for Practical Biometric-Based Access Control

TL;DR: This paper describes an efficient and collusion-resistant thABE scheme featuring dynamically-specifiable threshold values and is proven secure in the random oracle model, and its efficiency and flexibility are compared with Sahai and Waters' ABE scheme.
Book ChapterDOI

Using Mediated Identity-Based Cryptography to Support Role-Based Access Control

TL;DR: A secure method to manage role keys is proposed and a recent pairing-based mediated identity-based cryptographic scheme is extended to allow the enforcement of possession of multiple roles to access certain documents.
Proceedings Article

Efficient Revocation of Dynamic Security Privileges in Hierarchically Structured Communities.

TL;DR: This paper presents the first mediated hierarchical identity-based encryption and signature schemes designed to support information access control in hierarchically structured communities of users whose access privileges change very dynamically.
Book ChapterDOI

Time-based release of confidential information in hierarchical settings

TL;DR: This paper presents and analyzes the efficiency of a novel HTIR scheme that enables the gradual distribution of encrypted confidential information to large, distributed, (potentially) hierarchically structured user communities, and the subsequent publication of corresponding short decryption keys, at a predetermined time.
Journal ArticleDOI

Hierarchical time-based information release

TL;DR: This paper presents and analyzes the efficiency of a novel HTIR scheme that enables the gradual distribution of encrypted confidential information to large, distributed, (potentially) hierarchically structured user communities and the subsequent publication of corresponding short decryption keys, at a predetermined time.