Publication | Closed Access
Concealing complex policies with hidden credentials
168
Citations
11
References
2004
Year
Unknown Venue
Hardware SecurityLightweight Authentication MechanismAuthentication AuthorizationPrivacy ProtectionEngineeringUsable SecurityHidden CredentialsSensitive Resource RequestsInformation SecurityCryptographic ProtectionSecret Splitting SchemeIdentity-based SecurityData PrivacyPrivacy-preserving CommunicationComputer ScienceData SecurityCryptography
Hidden credentials are useful in protecting sensitive resource requests, resources, policies, and credentials. We propose a significant performance improvement when implementing hidden credentials using Boneh/Franklin Identity Based Encryption. We also propose a substantially improved secret splitting scheme for enforcing complex policies, and show how it improves concealment of policies from nonsatisfying recipients.
| Year | Citations | |
|---|---|---|
Page 1
Page 1