Cryptographic Access Control : Security Models, Relations and Construction