Hidden Credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. We show how transactions which depend on fulfillment of policies described by monotonic boolean formulae can take place in a single round of messages. We further show how credentials that are never revealed can be used to retrieve sensitive resources. Categories and Subject Descriptors D.4.6 [Operating Systems]: Security and Protection— Access controls, Authentication; K.6.5 [Management of Computing and Information Systems]: Security and Protection—Authentication General Terms Algorithms, Security, Theory Keywords Authentication, Privacy, Credentials, Trust Negotiation, Identity Based Encryption
Jason E. Holt, Robert W. Bradshaw, Kent E. Seamons