An Improved Trust Negotiation Protocol with Hidden Credentials

CISW '07 Proceedings of the 2007 International Conference on Computational Intelligence and Security Workshops(2007)

引用 3|浏览0
暂无评分
摘要
Hidden credentials are widely used for strangers in open environments to establish mutual trust without actually disclosing credentials and policies. With these schemes, sensitive resource and policies are protected against being leaked to unqualified recipients. However, an adversary is able to tamper negotiation messages or flood error messages to the recipient. Because the traditional protocol with hidden credentials omits integrity and authentication protection, the recipient still tries each of his credentials to decrypt the message. These will add the recipient's computational overhead and result in potential threats to the protocol. In this paper, we develop an improved trust negotiation protocol to prevent such attack. Compared with previously proposed trust negotiation protocol, our protocol uses cryptographic authentication mechanisms which can help the recipient to detect any modification and identify hostile sender. We also discuss the security and performance of the improved protocol.
更多
查看译文
关键词
improved trust negotiation protocol,protocols,unqualified recipient,cryptography,hidden credential,flood error messages,mutual trust,negotiation message,cryptographic authentication mechanisms,computational overhead,authentication protection,trust negotiation protocol,hidden credentials,message authentication,traditional protocol,tamper negotiation messages,cryptographic authentication mechanism,improved protocol
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要