DocumentCode :
2704733
Title :
An Improved Trust Negotiation Protocol with Hidden Credentials
Author :
Cai, Guoming ; Wang, Yadi ; Zhu, Zhiqiang ; Xu, Kaiyong
Author_Institution :
Inst. Zhengzhou, Zhengzhou
fYear :
2007
fDate :
15-19 Dec. 2007
Firstpage :
510
Lastpage :
513
Abstract :
Hidden credentials are widely used for strangers in open environments to establish mutual trust without actually disclosing credentials and policies. With these schemes, sensitive resource and policies are protected against being leaked to unqualified recipients. However, an adversary is able to tamper negotiation messages or flood error messages to the recipient. Because the traditional protocol with hidden credentials omits integrity and authentication protection, the recipient still tries each of his credentials to decrypt the message. These will add the recipient´s computational overhead and result in potential threats to the protocol. In this paper, we develop an improved trust negotiation protocol to prevent such attack. Compared with previously proposed trust negotiation protocol, our protocol uses cryptographic authentication mechanisms which can help the recipient to detect any modification and identify hostile sender. We also discuss the security and performance of the improved protocol.
Keywords :
cryptography; message authentication; protocols; authentication protection; computational overhead; cryptographic authentication mechanisms; flood error messages; hidden credentials; tamper negotiation messages; trust negotiation protocol; Authentication; Computational intelligence; Cryptographic protocols; Cryptography; Floods; Identity-based encryption; Privacy; Protection; Public key; Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computational Intelligence and Security Workshops, 2007. CISW 2007. International Conference on
Conference_Location :
Harbin
Print_ISBN :
978-0-7695-3073-4
Type :
conf
DOI :
10.1109/CISW.2007.4425545
Filename :
4425545
Link To Document :
بازگشت