Hidden Credentials

  • Authors:
  • Jason E. Holt;Robert W. Bradshaw;Kent E. Seamons;Hilarie Orman

  • Affiliations:
  • Brigham Young University, Provo, UT;Brigham Young University, Provo, UT;Brigham Young University, Provo, UT;Purple Streak, Inc., Salem, UT

  • Venue:
  • Proceedings of the 2003 ACM workshop on Privacy in the electronic society
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

Hidden Credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. We show how transactions which depend on fulfillment of policies described by monotonic boolean formulae can take place in a single round of messages. We further show how credentials that are never revealed can be used to retrieve sensitive resources.