Proceedings of the 11th ACM Conference on Computer and Communications Security 2004
DOI: 10.1145/1030083.1030104
|View full text |Cite
|
Sign up to set email alerts
|

Concealing complex policies with hidden credentials

Abstract: Hidden credentials are useful in protecting sensitive resource requests, resources, policies, and credentials. We propose a significant performance improvement when implementing hidden credentials using Boneh/Franklin Identity Based Encryption. We also propose a substantially improved secret splitting scheme for enforcing complex policies, and show how it improves concealment of policies from nonsatisfying recipients.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
82
0

Year Published

2005
2005
2013
2013

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 120 publications
(82 citation statements)
references
References 12 publications
(27 reference statements)
0
82
0
Order By: Relevance
“…For example, Holt [16] also considered security of IBE in the multi-TA setting, motivated by earlier work on anonymous credential systems [17,9]. However, the TA anonymity requirements for these applications are yet to be formally investigated.…”
Section: Discussionmentioning
confidence: 99%
“…For example, Holt [16] also considered security of IBE in the multi-TA setting, motivated by earlier work on anonymous credential systems [17,9]. However, the TA anonymity requirements for these applications are yet to be formally investigated.…”
Section: Discussionmentioning
confidence: 99%
“…A passive adversary may deduce the policy structure, i.e., the operators (AND, OR, m-of-n threshold encryption) used in the policy but she does not learn what credentials are required to fulfill the access policy unless she possesses them. Bradshaw et al [9] extend the original hidden credentials scheme to limit the partial disclosure of the policy structure and speed up the decryption operations. However, in this scheme, it is not easy to support non-monotonic boolean expressions and range queries in the access policy.…”
Section: Related Workmentioning
confidence: 99%
“…Although these techniques protect authenticators' privacy, they leak community membership to eavesdroppers. Mechanisms such as Key-private encryption [11], affiliation-hiding envelopes [29], hidden credentials [15] and oblivious signaturebased envelopes (OSBEs) [33] can privately share information with 9 1 Note as well that as cellular networks approach their theoretical communication limits, peer-to-peer wireless offer an alternative to further extend wireless throughput between local devices. members of a group.…”
Section: Introductionmentioning
confidence: 99%