scispace - formally typeset
K

Keith B. Frikken

Researcher at Purdue University

Publications -  22
Citations -  907

Keith B. Frikken is an academic researcher from Purdue University. The author has contributed to research in topics: Access control & Digital credential. The author has an hindex of 13, co-authored 22 publications receiving 879 citations.

Papers
More filters
Proceedings ArticleDOI

Dynamic and efficient key management for access hierarchies

TL;DR: This work is the first to achieve a worst- and average-case number of bit operations for key derivation that is exponentially better than the depth of a balanced hierarchy (double-exponentially better if the hierarchy is unbalanced); this is achieved with only a constant increase in the space for the hierarchy.
Proceedings ArticleDOI

Private collaborative forecasting and benchmarking

TL;DR: Protocols for forecasting and benchmarking that reveal to the participants the desired answers yet do not reveal to any participant any other participant's private data are given, including floating point arithmetic, in particular it provides protocols to securely and efficiently perform division.
Journal ArticleDOI

Attribute-Based Access Control with Hidden Policies and Hidden Credentials

TL;DR: In this article, the authors present protocols that protect both sensitive credentials and sensitive policies in trust negotiations in an open environment such as the Internet, where the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather than the identity) of the requester via digital credentials.
Proceedings ArticleDOI

Hidden access control policies with hidden credentials

TL;DR: An efficient protocol is presented that protects both sensitive credentials and policies, and Alice gets the resource only if she satisfies Bob's policy, Bob does not learn anything about Alice's credentials (not even whether Alice got access or not), and Alice learns neitherBob's policy structure nor which credentials caused her to gain access.
Proceedings Article

Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles

TL;DR: This paper uses novel techniques to implement a non-standard trust negotiation strategy specifically suited to this framework, which is a substantial extension of the state-of-the-art in privacypreserving trust negotiations.