Privacy-preserving trust negotiation with hidden credentials and hidden policies in a multi-party environment

Until now, there are numerous protocols that can achieve privacy-preserving trust negotiation between two parties involved, but there is no effective privacy-preserving trust negotiation schemes proposed between multi-users. In this paper, a privacy-preserving trust negotiation scheme with multi-parties is proposed, which can protect their credentials and access control policies during the procedure for establishing the trust between multi-strangers, and its privacy-preserving ability also is proved. These works extend the trust negotiation mechanism to multi-users, which can be thought as a substantial extension of the state-of-the-art in privacy-preserving trust negotiations between two parties involved

[1]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[2]  Kent E. Seamons,et al.  Concealing complex policies with hidden credentials , 2004, CCS '04.

[3]  Marianne Winslett,et al.  PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet , 2000, CCS.

[4]  Ninghui Li,et al.  Safety in Automated Trust Negotiation , 2004, IEEE Symposium on Security and Privacy.

[5]  Moti Yung,et al.  Proceedings of the 9th international conference on Financial Cryptography and Data Security , 2005 .

[6]  Ninghui Li,et al.  Oblivious signature-based envelope , 2003, PODC.

[7]  Refik Molva,et al.  Policy-Based Cryptography and Applications , 2005, Financial Cryptography.

[8]  Brent Waters,et al.  Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys , 2005, CRYPTO.

[9]  Marianne Winslett,et al.  Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation , 2001, NDSS.

[10]  Benny Pinkas,et al.  Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.

[11]  K.E. Seamons,et al.  Automated trust negotiation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.

[12]  Moni Naor,et al.  Oblivious transfer and polynomial evaluation , 1999, STOC '99.

[13]  Diana K. Smetters,et al.  Secret handshakes from pairing-based key agreements , 2003, 2003 Symposium on Security and Privacy, 2003..

[14]  Ninghui Li,et al.  OACerts: Oblivious Attribute Certificates , 2005, IEEE Transactions on Dependable and Secure Computing.