Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles
Author
Keith B. Frikken, Jiangtao Li, Mikhail J. Atallah
Tech report number
CERIAS TR 2006-55
Abstract
The main result of this paper is a protocol for negotiation trust between (two users) without revealing either credentials or policies, which each credential has its own access policy associated with it. Our protocol carries out this privacy-preserving trust negotiation between (two users), while enforcing each credential's policy.
Address
San Diego, California
Series
Proceedings of 13th Annual Network and Distributed System Security Symposium (NDSS)
Publication Date
2006-02-01
Contents
1. Introduction
2. Our Contributions
3. Trust Negotiation: Review and Discussion
4. Our Approach
5. Review of Cryptographic Tools and Hidden Credentials System
6. Protocol for Privacy-Preserving Trust Negotiation
7. Efficiency Improvements
8. Security Proofs
9. Related Work
10. Conclusion
Subject
Trust Negotiation