Hidden credentials are useful in protecting sensitive resource requests, resources, policies, and credentials. We propose a significant performance improvement when implementing hidden credentials using Boneh/Franklin Identity Based Encryption. We also propose a substantially improved secret splitting scheme for enforcing complex policies, and show how it improves concealment of policies from nonsatisfying recipients. Categories and Subject Descriptors K.6.5 [Security and Protection]: Authentication General Terms Algorithms, Security, Theory Keywords Authentication, Privacy, Credentials, Trust Negotiation, Secret Sharing, Identity Based Encryption
Robert W. Bradshaw, Jason E. Holt, Kent E. Seamons