Skip to main content
Log in

Privacy-preserving trust negotiation with hidden credentials and hidden policies in a multi-party environment

  • Published:
Wuhan University Journal of Natural Sciences

Abstract

Until now, there are numerous protocols that can achieve privacy-preserving trust negotiation between two parties involved, but there is no effective privacy-preserving trust negotiation schemes proposed between multi-users. In this paper, a privacy-preserving trust negotiation scheme with multi-parties is proposed, which can protect their credentials and access control policies during the procedure for establishing the trust between multi-strangers, and its privacy-preserving ability also is proved. These works extend the trust negotiation mechanism to multi-users, which can be thought as a substantial extension of the state-of-the-art in privacy-preserving trust negotiations between two parties involved

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Blaze M, Feigenbaum J, Lacy J. Decentralized Trust Management[ C]//Proceedings of IEEE Symposium on Security and Privacy (S&P’1996). Oakland: IEEE Computer Society Press, 1996: 164–173.

    Google Scholar 

  2. Winsborough H, Seamons E, Jones E. Automated Trust Negotiation[C]//Proceedings of DARPA Information Survivability Conference and Exposition. New York: IEEE Press, 2000: 88–102.

    Google Scholar 

  3. Seamons K E, Winslett M, Yu T. Limiting the Disclosure of Access Control Policies During Automated Trust Negotiation[C]//Proceedings of the Symposium on Network and Distributed System Security (NDSS’01). San Diego: Internet Society Press, 2001: 109–124.

    Google Scholar 

  4. Winsborough W H, Li N H. Safety in Automated Trust Negotiation[ C]//Proceedings of the IEEE Symposium on Security and Privacy. Washington: IEEE Computer Society Press, 2004: 147–160.

    Chapter  Google Scholar 

  5. Bradshaw R W, Holt J E, Seamons K E. Concealing Complex Policies with Hidden Credentials[C]//Proceedings of 11th ACM Conference on Computer and Communications Security. New York: ACM Press, 2004: 146–157.

    Google Scholar 

  6. Balfanz D, Durfee G, Shankar N, et al. Secret Hand-shakes from Pairing-Based Key Agreements[C]//Proceedings of the IEEE Symposium and Security and Privacy. Oakland: IEEE Computer Society Press, 2003: 180–196.

    Google Scholar 

  7. Li N H, Du W, Boneh D. Oblivious Signature-based Envelope[C]//Proceedings of the 22nd ACM Symposium on Principles of Distributed Computing (PODC’2003). Boston: ACM Press, 2003: 182–189.

    Google Scholar 

  8. Li J T, Li N H. OACerts: Oblivious Attribute Certificates [C]//Proceedings of the 3rd Conference on Applied Cryptography and Network Security (ACNS’2005). New York: Springer-Verlag, 2005: 301–317.

    Google Scholar 

  9. Bagga W, Molva R. Policy-Based Cryptography and Applications[C]//Proceedings of the 9th International Conference on Financial Cryptography and Data Security. Roseau: Springer-Verlag, 2005: 72–87.

    Google Scholar 

  10. Yu T, Ma X, Winslett P. An Efficient and Complete Strategy for Trust Negotiation over the Internet[C]// Proceedings of the 7th ACM Conference on Computer and Communications Security (CCS-7). Athens: ACM Press, 2000: 210–219.

    Google Scholar 

  11. Goldreich O. Secure Multi-Party Computation[EB/OL]. [2007-09-05]. http://philby.ucsb.edu/cryptolib/BOOKS.

  12. Naor M, Pinkas B. Oblivious Transfer and Polynomial Evaluation[C]//Proceedings of 31st Annual ACM Symposium on Theory of Computing. Atlanta: ACM Press, 1999: 245–254.

    Google Scholar 

  13. Boneh D, Gentry C, Waters B. Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys[C]// Proceedings of Crypto’05. Santa Barbara: Springer-Verlag, 2005: 258–275.

    Google Scholar 

  14. Freedman M J, Nissm K, Pinkas B. Efficient Private Matching and Set Intersection[C]//Proceedings of EUROCRYPT’2004. Heidelberg: Springer-Verlag, 2004: 1–19.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qiuliang Xu.

Additional information

Foundation item: Supported by the Natural Science Foundation of Shandong Province (Y2007G37) and the Science and Technology Development Program of Shandong Province (2007GG10001012)

Rights and permissions

Reprints and permissions

About this article

Cite this article

Guo, S., Wei, J., Zhang, C. et al. Privacy-preserving trust negotiation with hidden credentials and hidden policies in a multi-party environment. Wuhan Univ. J. Nat. Sci. 13, 553–556 (2008). https://doi.org/10.1007/s11859-008-0508-3

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11859-008-0508-3

Key words

CLC number

Navigation