K
Keith B. Frikken
Researcher at Purdue University
Publications - 22
Citations - 907
Keith B. Frikken is an academic researcher from Purdue University. The author has contributed to research in topics: Access control & Digital credential. The author has an hindex of 13, co-authored 22 publications receiving 879 citations.
Papers
More filters
Proceedings ArticleDOI
Dynamic and efficient key management for access hierarchies
TL;DR: This work is the first to achieve a worst- and average-case number of bit operations for key derivation that is exponentially better than the depth of a balanced hierarchy (double-exponentially better if the hierarchy is unbalanced); this is achieved with only a constant increase in the space for the hierarchy.
Proceedings ArticleDOI
Private collaborative forecasting and benchmarking
TL;DR: Protocols for forecasting and benchmarking that reveal to the participants the desired answers yet do not reveal to any participant any other participant's private data are given, including floating point arithmetic, in particular it provides protocols to securely and efficiently perform division.
Journal ArticleDOI
Attribute-Based Access Control with Hidden Policies and Hidden Credentials
TL;DR: In this article, the authors present protocols that protect both sensitive credentials and sensitive policies in trust negotiations in an open environment such as the Internet, where the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather than the identity) of the requester via digital credentials.
Proceedings ArticleDOI
Hidden access control policies with hidden credentials
TL;DR: An efficient protocol is presented that protects both sensitive credentials and policies, and Alice gets the resource only if she satisfies Bob's policy, Bob does not learn anything about Alice's credentials (not even whether Alice got access or not), and Alice learns neitherBob's policy structure nor which credentials caused her to gain access.
Proceedings Article
Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles
TL;DR: This paper uses novel techniques to implement a non-standard trust negotiation strategy specifically suited to this framework, which is a substantial extension of the state-of-the-art in privacypreserving trust negotiations.