Privacy-preserving trust negotiation with hidden credentials and hidden policies in a multi-party environment
暂无分享,去创建一个
[1] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[2] Kent E. Seamons,et al. Concealing complex policies with hidden credentials , 2004, CCS '04.
[3] Marianne Winslett,et al. PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet , 2000, CCS.
[4] Ninghui Li,et al. Safety in Automated Trust Negotiation , 2004, IEEE Symposium on Security and Privacy.
[5] Moti Yung,et al. Proceedings of the 9th international conference on Financial Cryptography and Data Security , 2005 .
[6] Ninghui Li,et al. Oblivious signature-based envelope , 2003, PODC.
[7] Refik Molva,et al. Policy-Based Cryptography and Applications , 2005, Financial Cryptography.
[8] Brent Waters,et al. Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys , 2005, CRYPTO.
[9] Marianne Winslett,et al. Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation , 2001, NDSS.
[10] Benny Pinkas,et al. Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.
[11] K.E. Seamons,et al. Automated trust negotiation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[12] Moni Naor,et al. Oblivious transfer and polynomial evaluation , 1999, STOC '99.
[13] Diana K. Smetters,et al. Secret handshakes from pairing-based key agreements , 2003, 2003 Symposium on Security and Privacy, 2003..
[14] Ninghui Li,et al. OACerts: Oblivious Attribute Certificates , 2005, IEEE Transactions on Dependable and Secure Computing.