Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1030083.1030104acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Concealing complex policies with hidden credentials

Published: 25 October 2004 Publication History
  • Get Citation Alerts
  • Abstract

    Hidden credentials are useful in protecting sensitive resource requests, resources, policies, and credentials. We propose a significant performance improvement when implementing hidden credentials using Boneh/Franklin Identity Based Encryption. We also propose a substantially improved secret splitting scheme for enforcing complex policies, and show how it improves concealment of policies from nonsatisfying recipients.

    References

    [1]
    D. Balfanz, G. Durfee, N. Shankar, D. Smetters, J. Staddon, and H. Wong. Secret handshakes from pairing-based key agreements. In Proceedings of the 2003 IEEE Symposium on Security and Privacy, pages 180--196, Oakland, CA, May 2003.]]
    [2]
    M. Bellare and C. Namprempre. Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. In Asiacrypt, volume 1976 of Lecture Notes in Computer Science. Springer-Verlag, 2000. Extended abstract.]]
    [3]
    J. C. Benaloh and J. Leichter. Generalized secret sharing and monotone functions. In S. Goldwasser, editor, Advances in Cryptology - CRYPTO '88, volume 403 of Lecture Notes in Computer Science, pages 27--35. Springer, 1990.]]
    [4]
    E. Bertino, E. Ferrari, and A. Squicciarini. χ-TNL: An XML-based language for trust negotiation. In Fourth IEEE International Workshop on Policies for Distributed Systems and Networks, pages 81--84, Como, Italy, June 2003. IEEE Computer Society Press.]]
    [5]
    P. Bonatti and P. Samarati. Regulating service access and information release on the web. In Proceedings of the 7th ACM Conference on Computer and Communications Security (CCS-7), pages 134--143. ACM Press, Nov. 2000.]]
    [6]
    D. Boneh and M. Franklin. Identity-based encryption from the Weil pairing. In Proceedings of Crypto 2001, volume 2139 of Lecture Notes in Computer Science, pages 213--229. Springer, 2001.]]
    [7]
    E. Fujisaki and T. Okamoto. Secure integration of asymmetric and symmetric encryption schemes. Lecture Notes in Computer Science, 1666:537--554, 1999.]]
    [8]
    J. Holt, R. Bradshaw, K. E. Seamons, and H. Orman. Hidden credentials. In 2nd ACM Workshop on Privacy in the Electronic Society, pages 1--8, Washington, DC, Oct. 2003. ACM Press.]]
    [9]
    N. Li, W. Du, and D. Boneh. Oblivious signature-based envelope. In Proceedings of the 22nd ACM Symposium on Principles of Distributed Computing (PODC 2003), pages 182--189, Boston, Massachusetts, July 2003. ACM Press.]]
    [10]
    K. E. Seamons, M. Winslett, and T. Yu. Limiting the disclosure of access control policies during automated trust negotiation. In Network and Distributed System Security Symposium, pages 109--124, San Diego, CA, Feb. 2001.]]
    [11]
    W. H. Winsborough, K. E. Seamons, and V. E. Jones. Automated trust negotiation. In DARPA Information Survivability Conference and Exposition, volume I, pages 88--102, Hilton Head, SC, Jan. 2000. IEEE Press.]]
    [12]
    M. Winslett, T. Yu, K. E. Seamons, A. Hess, J. Jacobson, R. Jarvis, B. Smith, and L. Yu. Negotiating trust on the web. IEEE Internet Computing, 6(6):30--37, November/December 2002.]]
    [13]
    T. Yu and M. Winslett. A Unified Scheme for Resource Protection in Automated Trust Negotiation. In IEEE Symposium on Security and Privacy, Oakland, CA, May 2003.]]

    Cited By

    View all
    • (2023)A Study On Ciphertext Policy Attribute Based Encryption2023 9th International Conference on Advanced Computing and Communication Systems (ICACCS)10.1109/ICACCS57279.2023.10113095(2398-2402)Online publication date: 17-Mar-2023
    • (2021)A survey on multi-authority and decentralized attribute-based encryptionJournal of Ambient Intelligence and Humanized Computing10.1007/s12652-021-02915-5Online publication date: 15-Mar-2021
    • (2020)Smart Grid Data Security using Practical CP-ABE with Obfuscated Policy and Outsourcing Decryption2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)10.1109/CyberSA49311.2020.9139628(1-8)Online publication date: Jun-2020
    • Show More Cited By

    Index Terms

    1. Concealing complex policies with hidden credentials

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CCS '04: Proceedings of the 11th ACM conference on Computer and communications security
      October 2004
      376 pages
      ISBN:1581139616
      DOI:10.1145/1030083
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 25 October 2004

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. authentication
      2. credentials
      3. identity based encryption
      4. privacy
      5. secret sharing
      6. trust negotiation

      Qualifiers

      • Article

      Conference

      CCS04
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)6
      • Downloads (Last 6 weeks)1

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)A Study On Ciphertext Policy Attribute Based Encryption2023 9th International Conference on Advanced Computing and Communication Systems (ICACCS)10.1109/ICACCS57279.2023.10113095(2398-2402)Online publication date: 17-Mar-2023
      • (2021)A survey on multi-authority and decentralized attribute-based encryptionJournal of Ambient Intelligence and Humanized Computing10.1007/s12652-021-02915-5Online publication date: 15-Mar-2021
      • (2020)Smart Grid Data Security using Practical CP-ABE with Obfuscated Policy and Outsourcing Decryption2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)10.1109/CyberSA49311.2020.9139628(1-8)Online publication date: Jun-2020
      • (2020)Blending Convergent Encryption and Access Control Scheme for Achieving A Secure and Storage Efficient Cloud2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC)10.1109/CCNC46108.2020.9045108(1-6)Online publication date: Jan-2020
      • (2018)Functional CredentialsProceedings on Privacy Enhancing Technologies10.1515/popets-2018-00132018:2(64-84)Online publication date: 20-Feb-2018
      • (2017)The fuzzy control of trust establishment2017 4th International Conference on Systems and Informatics (ICSAI)10.1109/ICSAI.2017.8248370(655-659)Online publication date: Nov-2017
      • (2016)Trust Management and Delegation for the Administration of Web ServicesLeadership and Personnel Management10.4018/978-1-4666-9624-2.ch026(570-589)Online publication date: 2016
      • (2016)Revocation basis and proofs access control for cloud storage multi-authority systems2016 Third International Conference on Artificial Intelligence and Pattern Recognition (AIPR)10.1109/ICAIPR.2016.7585223(1-10)Online publication date: Sep-2016
      • (2016)Multi-authority trust access control for cloud storage2016 4th International Conference on Cloud Computing and Intelligence Systems (CCIS)10.1109/CCIS.2016.7790297(429-433)Online publication date: Aug-2016
      • (2016)Privacy, Discovery, and Authentication for the Internet of ThingsComputer Security – ESORICS 201610.1007/978-3-319-45741-3_16(301-319)Online publication date: 15-Sep-2016
      • Show More Cited By

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media