Hidden Credentials
- 30 October 2003
- conference paper
- conference paper
- Published by Association for Computing Machinery (ACM)
Abstract
Hidden Credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. We show how transactions which depend on fulfillment of policies described by monotonic boolean formulae can take place in a single round of messages. We further show how credentials that are never revealed can be used to retrieve sensitive resources.Keywords
This publication has 7 references indexed in Scilit:
- Oblivious signature-based envelopePublished by Association for Computing Machinery (ACM) ,2003
- Towards practical automated trust negotiationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Negotiating trust in the WebIEEE Internet Computing, 2002
- Protecting sensitive attributes in automated trust negotiationPublished by Association for Computing Machinery (ACM) ,2002
- Identity-Based Encryption from the Weil PairingLecture Notes in Computer Science, 2001
- Regulating service access and information release on the WebPublished by Association for Computing Machinery (ACM) ,2000
- Generalized Secret Sharing and Monotone FunctionsLecture Notes in Computer Science, 1990