skip to main content
10.1145/1005140.1005142acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Hidden Credentials

Published: 30 October 2003 Publication History

Abstract

Hidden Credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. We show how transactions which depend on fulfillment of policies described by monotonic boolean formulae can take place in a single round of messages. We further show how credentials that are never revealed can be used to retrieve sensitive resources.

References

[1]
D. Balfanz, G. Durfee, N. Shankar, D. Smetters, J. Staddon, H. C. Wong. Secret Handshakes from Pairing-Based Key Agreements. IEEE Symposium on Security and Privacy (Oakland 2003), Oakland, California, June 2003.]]
[2]
J. C. Benaloh and J. Leichter. Generalized Secret Sharing and Monotone Functions. Proceedings of Crypto 1988, Advances in Cryptology, Lecture Notes in Computer Science, Vol. 403, S. Goldwasser Ed., Springer-Verlag, pp. 27--35, 1990.]]
[3]
P. A. Bonatti, P. Samarati. Regulating service access and information release on the Web. Proceedings of the 7th ACM Conference on Computer and Communications Security, Athens, Greece, November 2000.]]
[4]
D. Boneh and M. Franklin. Identity based encryption from the Weil pairing. Extended abstract in proceedings of Crypto 2001, Advances in Cryptology, Lecture Notes in Computer Science, Vol. 2139, Springer-Verlag, pp. 213--229, 2001.]]
[5]
N. Li, W. Du, D. Boneh. Oblivious Signature-Based Envelope. ACM Symposium on Principles of Distributed Computing (PODC 2003), Boston, Massachusetts, July 2003.]]
[6]
K. E. Seamons, M. Winslett, and T. Yu. Limiting the Disclosure of Access Control Policies During Automated Trust Negotiation. Network and Distributed System Security Symposium, San Diego, CA, February 2001.]]
[7]
W. H. Winsborough and N. Li. Protecting Sensitive Attributes in Automated Trust Negotiation. Proceedings of ACM Workshop on Privacy in the Electronic Society, Washington, DC, November 2002.]]
[8]
W. H. Winsborough and N. Li. Towards Practical Trust Negotiation. Proceedings of the Third International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), Monterey, California, June 2002.]]
[9]
W. H. Winsborough, K. E. Seamons, and V. E. Jones. Automated Trust Negotiation. DARPA Information Survivability Conference and Exposition, Hilton Head, SC, January 2000.]]
[10]
M. Winslett, T. Yu, K. E. Seamons, A. Hess, J. Jacobson, R. Jarvis, B. Smith, and L. Yu. Negotiating Trust on the Web. IEEE Internet Computing, Volume 6, No. 6, November/December 2002.]]
[11]
T. Yu, M. Winslett. A Unified Scheme for Resource Protection in Automated Trust Negotiation. IEEE Symposium on Security and Privacy (Oakland 2003), Oakland, California, June 2003.]]

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WPES '03: Proceedings of the 2003 ACM workshop on Privacy in the electronic society
October 2003
135 pages
ISBN:1581137761
DOI:10.1145/1005140
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 30 October 2003

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. authentication
  2. credentials
  3. identity based encryption
  4. privacy
  5. trust negotiation

Qualifiers

  • Article

Conference

CCS03
Sponsor:

Acceptance Rates

Overall Acceptance Rate 106 of 355 submissions, 30%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)6
  • Downloads (Last 6 weeks)1
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2021)Anonymous IBE from PEKS: A Generic ConstructionInformation Security Applications10.1007/978-3-030-89432-0_9(105-118)Online publication date: 27-Oct-2021
  • (2020)TBSAC: Token-Based Secured Access Control for Cloud DataAmbient Communications and Computer Systems10.1007/978-981-15-1518-7_20(243-253)Online publication date: 14-Mar-2020
  • (2019)WAVEProceedings of the 28th USENIX Conference on Security Symposium10.5555/3361338.3361434(1375-1392)Online publication date: 14-Aug-2019
  • (2017)Generic Framework for Attribute-Based Group SignatureInformation Security Practice and Experience10.1007/978-3-319-72359-4_51(814-834)Online publication date: 8-Dec-2017
  • (2016)MASHaBLEProceedings of the 22nd Annual International Conference on Mobile Computing and Networking10.1145/2973750.2973778(387-400)Online publication date: 3-Oct-2016
  • (2016)An energy efficient privacy-preserving content sharing scheme in mobile social networksPersonal and Ubiquitous Computing10.1007/s00779-016-0952-620:5(833-846)Online publication date: 1-Oct-2016
  • (2016)Privacy, Discovery, and Authentication for the Internet of ThingsComputer Security – ESORICS 201610.1007/978-3-319-45741-3_16(301-319)Online publication date: 15-Sep-2016
  • (2015)Privacy-preserving User MatchingProceedings of the 14th ACM Workshop on Privacy in the Electronic Society10.1145/2808138.2808148(111-120)Online publication date: 12-Oct-2015
  • (2015)Access Control for Cloud Applications2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom)10.1109/UIC-ATC-ScalCom-CBDCom-IoP.2015.183(970-977)Online publication date: Aug-2015
  • (2014)Vector-Based Sensitive Information Protecting Scheme in Automatic Trust NegotiationJournal of Networks10.4304/jnw.9.4.927-9319:4Online publication date: 1-Apr-2014
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media