Sciweavers

WPES
2003
ACM

Hidden Credentials

13 years 9 months ago
Hidden Credentials
Hidden Credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. We show how transactions which depend on fulfillment of policies described by monotonic boolean formulae can take place in a single round of messages. We further show how credentials that are never revealed can be used to retrieve sensitive resources. Categories and Subject Descriptors D.4.6 [Operating Systems]: Security and Protection— Access controls, Authentication; K.6.5 [Management of Computing and Information Systems]: Security and Protection—Authentication General Terms Algorithms, Security, Theory Keywords Authentication, Privacy, Credentials, Trust Negotiation, Identity Based Encryption
Jason E. Holt, Robert W. Bradshaw, Kent E. Seamons
Added 05 Jul 2010
Updated 05 Jul 2010
Type Conference
Year 2003
Where WPES
Authors Jason E. Holt, Robert W. Bradshaw, Kent E. Seamons, Hilarie K. Orman
Comments (0)