Concealing complex policies with hidden credentials

  • Authors:
  • Robert W. Bradshaw;Jason E. Holt;Kent E. Seamons

  • Affiliations:
  • Brigham Young University;Brigham Young University;Brigham Young University

  • Venue:
  • Proceedings of the 11th ACM conference on Computer and communications security
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

Hidden credentials are useful in protecting sensitive resource requests, resources, policies, and credentials. We propose a significant performance improvement when implementing hidden credentials using Boneh/Franklin Identity Based Encryption. We also propose a substantially improved secret splitting scheme for enforcing complex policies, and show how it improves concealment of policies from nonsatisfying recipients.