Sciweavers

CCS
2004
ACM

Concealing complex policies with hidden credentials

14 years 5 months ago
Concealing complex policies with hidden credentials
Hidden credentials are useful in protecting sensitive resource requests, resources, policies, and credentials. We propose a significant performance improvement when implementing hidden credentials using Boneh/Franklin Identity Based Encryption. We also propose a substantially improved secret splitting scheme for enforcing complex policies, and show how it improves concealment of policies from nonsatisfying recipients. Categories and Subject Descriptors K.6.5 [Security and Protection]: Authentication General Terms Algorithms, Security, Theory Keywords Authentication, Privacy, Credentials, Trust Negotiation, Secret Sharing, Identity Based Encryption
Robert W. Bradshaw, Jason E. Holt, Kent E. Seamons
Added 01 Jul 2010
Updated 01 Jul 2010
Type Conference
Year 2004
Where CCS
Authors Robert W. Bradshaw, Jason E. Holt, Kent E. Seamons
Comments (0)