Data is key: introducing the data-based access control paradigm

Wolter Pieters, Qiang Tang

    Research output: Book/ReportReportProfessional

    1 Citation (Scopus)
    98 Downloads (Pure)


    According to the Jericho forum, the trend in information security is moving the security perimeter as close to the data as possible. In this context, we suggest the idea of data-based access control, where decryption of data is made possible by knowing enough of the data. Trust is thus based on what someone already knows. A specific problem is defined as follows: given n pieces of data, an agent is able to recover all n items once she knows k of them. The problem is similar to both secure sketches and secret sharing, and we show that both can be used as a basis for constructions. Examples of possible applications are granting access without credentials, recovering forgotten passwords and sharing personal data in social networks.
    Original languageUndefined
    Place of PublicationEnschede
    PublisherCentre for Telematics and Information Technology (CTIT)
    Number of pages13
    Publication statusPublished - Jun 2009

    Publication series

    NameCTIT Technical Report Series
    PublisherCentre for Telematics and Information Technology, University of Twente
    ISSN (Print)1381-3625


    • IR-65511
    • De-perimeterisation
    • secret sharing
    • secure sketches
    • data-based access control
    • SCS-Cybersecurity
    • METIS-263874
    • EWI-15408

    Cite this