Attribute-based access control with hidden policies and hidden credentials

被引:71
|
作者
Frikken, Keith
Atallah, Mikhail
Li, Jiangtao
机构
[1] Purdue Univ, CERIAS, W Lafayette, IN 47907 USA
[2] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
基金
美国国家科学基金会;
关键词
electronic commerce-security; management of computing and information systems; security and protection; authentication; access control; trust negotiation; hidden credentials; privacy;
D O I
10.1109/TC.2006.158
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In an open environment such as the Internet, the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather than the identity) of the requester, via digital credentials: Access is granted if Alice's credentials satisfy Bob's access policy. The literature contains many scenarios in which it is desirable to carry out such trust negotiations in a privacy-preserving manner, i.e., so as minimize the disclosure of credentials and/or of access policies. Elegant solutions were, proposed for achieving various degrees of privacy-preservation through minimal disclosure. In this paper, we present protocols that protect both sensitive credentials and sensitive policies. That is, Alice gets the resource only if she satisfies the policy, Bob does not learn anything about Alice's credentials (not even whether Alice got access), and Alice learns neither Bob's policy structure nor which credentials caused her to gain access. Our protocols are efficient in terms of communication and in rounds of interaction.
引用
收藏
页码:1259 / 1270
页数:12
相关论文
共 50 条
  • [41] Oblivious Transfer with Hidden Access Control Policies
    Camenisch, Jan
    Dubovitskaya, Maria
    Neven, Gregory
    Zaverucha, Gregory M.
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2011, 2011, 6571 : 192 - +
  • [42] Attribute-Based Oblivious Access Control
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    Yan, Jun
    [J]. COMPUTER JOURNAL, 2012, 55 (10): : 1202 - 1215
  • [43] Improving Reuse of Attribute-Based Access Control Policies Using Policy Templates
    Decat, Maarten
    Moeys, Jasper
    Lagaisse, Bert
    Joosen, Wouter
    [J]. ENGINEERING SECURE SOFTWARE AND SYSTEMS (ESSOS 2015), 2015, 8978 : 196 - 210
  • [44] CRYPTOGRAPHIC ACCESS CONTROL FOR MANDATORY SECURITY POLICIES USING ATTRIBUTE-BASED ENCRYPTION
    Plecan, Daniel
    [J]. PROCEEDINGS OF THE ROMANIAN ACADEMY SERIES A-MATHEMATICS PHYSICS TECHNICAL SCIENCES INFORMATION SCIENCE, 2017, 18 : 413 - 429
  • [45] Multi-authority attribute-based encryption access control scheme with hidden policy and constant length ciphertext for cloud storage
    Fan Yundong
    Wu Xiaoping
    Wang Jiasheng
    [J]. 2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 205 - 212
  • [46] Threshold Attribute-Based Credentials With Redactable Signature
    Shi, Rui
    Feng, Huamin
    Yang, Yang
    Yuan, Feng
    Li, Yingjiu
    Pang, Hwee Hwa
    Deng, Robert H.
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (05) : 3751 - 3765
  • [47] Secure Cloud Storage Model with Hidden Policy Attribute based Access Control
    Sowmiya, M.
    Adimoolam, M.
    [J]. 2014 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2014,
  • [48] An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures
    Cui, Hui
    Deng, Robert H.
    Wu, Guowei
    Lai, Junzuo
    [J]. PROVABLE SECURITY, (PROVSEC 2016), 2016, 10005 : 19 - 38
  • [49] Issuer-Hiding Attribute-Based Credentials
    Bobolz, Jan
    Eidens, Fabian
    Krenn, Stephan
    Ramacher, Sebastian
    Samelin, Kai
    [J]. CRYPTOLOGY AND NETWORK SECURITY, CANS 2021, 2021, 13099 : 158 - 178
  • [50] Monotonicity and Completeness in Attribute-Based Access Control
    Crampton, Jason
    Morisset, Charles
    [J]. SECURITY AND TRUST MANAGEMENT (STM 2014), 2014, 8743 : 33 - 48