Abstract
Until now, there are numerous protocols that can achieve privacy-preserving trust negotiation between two parties involved, but there is no effective privacy-preserving trust negotiation schemes proposed between multi-users. In this paper, a privacy-preserving trust negotiation scheme with multi-parties is proposed, which can protect their credentials and access control policies during the procedure for establishing the trust between multi-strangers, and its privacy-preserving ability also is proved. These works extend the trust negotiation mechanism to multi-users, which can be thought as a substantial extension of the state-of-the-art in privacy-preserving trust negotiations between two parties involved
Similar content being viewed by others
References
Blaze M, Feigenbaum J, Lacy J. Decentralized Trust Management[ C]//Proceedings of IEEE Symposium on Security and Privacy (S&P’1996). Oakland: IEEE Computer Society Press, 1996: 164–173.
Winsborough H, Seamons E, Jones E. Automated Trust Negotiation[C]//Proceedings of DARPA Information Survivability Conference and Exposition. New York: IEEE Press, 2000: 88–102.
Seamons K E, Winslett M, Yu T. Limiting the Disclosure of Access Control Policies During Automated Trust Negotiation[C]//Proceedings of the Symposium on Network and Distributed System Security (NDSS’01). San Diego: Internet Society Press, 2001: 109–124.
Winsborough W H, Li N H. Safety in Automated Trust Negotiation[ C]//Proceedings of the IEEE Symposium on Security and Privacy. Washington: IEEE Computer Society Press, 2004: 147–160.
Bradshaw R W, Holt J E, Seamons K E. Concealing Complex Policies with Hidden Credentials[C]//Proceedings of 11th ACM Conference on Computer and Communications Security. New York: ACM Press, 2004: 146–157.
Balfanz D, Durfee G, Shankar N, et al. Secret Hand-shakes from Pairing-Based Key Agreements[C]//Proceedings of the IEEE Symposium and Security and Privacy. Oakland: IEEE Computer Society Press, 2003: 180–196.
Li N H, Du W, Boneh D. Oblivious Signature-based Envelope[C]//Proceedings of the 22nd ACM Symposium on Principles of Distributed Computing (PODC’2003). Boston: ACM Press, 2003: 182–189.
Li J T, Li N H. OACerts: Oblivious Attribute Certificates [C]//Proceedings of the 3rd Conference on Applied Cryptography and Network Security (ACNS’2005). New York: Springer-Verlag, 2005: 301–317.
Bagga W, Molva R. Policy-Based Cryptography and Applications[C]//Proceedings of the 9th International Conference on Financial Cryptography and Data Security. Roseau: Springer-Verlag, 2005: 72–87.
Yu T, Ma X, Winslett P. An Efficient and Complete Strategy for Trust Negotiation over the Internet[C]// Proceedings of the 7th ACM Conference on Computer and Communications Security (CCS-7). Athens: ACM Press, 2000: 210–219.
Goldreich O. Secure Multi-Party Computation[EB/OL]. [2007-09-05]. http://philby.ucsb.edu/cryptolib/BOOKS.
Naor M, Pinkas B. Oblivious Transfer and Polynomial Evaluation[C]//Proceedings of 31st Annual ACM Symposium on Theory of Computing. Atlanta: ACM Press, 1999: 245–254.
Boneh D, Gentry C, Waters B. Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys[C]// Proceedings of Crypto’05. Santa Barbara: Springer-Verlag, 2005: 258–275.
Freedman M J, Nissm K, Pinkas B. Efficient Private Matching and Set Intersection[C]//Proceedings of EUROCRYPT’2004. Heidelberg: Springer-Verlag, 2004: 1–19.
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation item: Supported by the Natural Science Foundation of Shandong Province (Y2007G37) and the Science and Technology Development Program of Shandong Province (2007GG10001012)
Rights and permissions
About this article
Cite this article
Guo, S., Wei, J., Zhang, C. et al. Privacy-preserving trust negotiation with hidden credentials and hidden policies in a multi-party environment. Wuhan Univ. J. Nat. Sci. 13, 553–556 (2008). https://doi.org/10.1007/s11859-008-0508-3
Received:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11859-008-0508-3