Policy controlled system with anonymity
From MaRDI portal
Publication:1786597
DOI10.1016/j.tcs.2018.05.038zbMath1408.94968OpenAlexW2808507275WikidataQ129655072 ScholiaQ129655072MaRDI QIDQ1786597
Willy Susilo, Pairat Thorncharoensri, Yi Mu
Publication date: 24 September 2018
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2018.05.038
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Attribute-based signcryption scheme based on linear codes
- Multi-designated verifiers signatures: anonymity without encryption
- Security arguments for digital signatures and blind signatures
- Public key cryptography -- PKC 2007. 10th international conference on practice and theory in public-key cryptography, Beijing, China, April 16--20, 2007. Proceedings.
- Attribute-based signatures from RSA
- Attribute-Based Signatures for Circuits from Bilinear Map
- Designated Verifier Proofs and Their Applications
- Short Attribute-Based Signatures for Threshold Predicates
- Identity-Based Cryptosystems and Signature Schemes
- Revocable Attribute-Based Signatures with Adaptive Security in the Standard Model
- Attribute-Based Signatures
- Efficient Attribute-Based Signatures for Non-monotone Predicates in the Standard Model
- Collusion-Free Policy-Based Encryption
- Threshold Attribute-Based Signcryption
- Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
- New directions in cryptography
- ID-Based Blind Signature and Ring Signature from Pairings
- Hierarchical ID-Based Cryptography
- Decentralized Attribute-Based Signatures
- Information Security and Privacy
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Information and Communications Security
- Policy-Based Signatures
- Progress in Cryptology - INDOCRYPT 2003
- On the Security Models of (Threshold) Ring Signature Schemes
- Information and Communications Security
- Security in Communication Networks
- Progress in Cryptology - INDOCRYPT 2004
- Financial Cryptography and Data Security
- Information Security and Cryptology - ICISC 2003
- Information Security and Cryptology - ICISC 2003
- Automata, Languages and Programming
- On the Power of Hierarchical Identity-Based Encryption
- Traceable Ring Signature
- Efficient Ring Signatures Without Random Oracles
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
- Information Security and Cryptology
- Theory of Cryptography
This page was built for publication: Policy controlled system with anonymity