Welcome to the resource topic for 2004/109
Concealing Complex Policies with Hidden Credentials
Authors: Robert Bradshaw, Jason Holt, Kent SeamonsAbstract:
Hidden credentials are useful in protecting sensitive resource requests, resources, policies and credentials. We propose a significant
improvement in decryption performance when implementing hidden credentials using the Franklin/Boneh IBE. We also propose a substantially improved secret splitting scheme for enforcing complex policies, and show how it improves concealment of policies from nonsatisfying recipients.
See all topics related to this paper.
Feel free to post resources that are related to this paper below.
Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.
For more information, see the rules for Resource Topics .