Attribute-Based Signatures

From MaRDI portal
Revision as of 21:47, 3 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:3073718

DOI10.1007/978-3-642-19074-2_24zbMath1284.94093OpenAlexW1517505812MaRDI QIDQ3073718

Mike Rosulek, Hemanta K. Maji, Manoj Prabhakaran

Publication date: 11 February 2011

Published in: Topics in Cryptology – CT-RSA 2011 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-19074-2_24





Related Items (56)

Short Attribute-Based Signatures for Threshold PredicatesAttribute-based signatures from lattices: unbounded attributes and semi-adaptive securityPolicy-based signature scheme from latticesGeneric Framework for Attribute-Based Group SignatureAttribute-based versions of Schnorr and ElGamalVerifiable fully outsourced attribute-based signcryption system for IoT eHealth big data in cloud computingOn the security of joint signature and encryption revisitedMore efficient structure-preserving signatures -- or: bypassing the type-III lower boundsSecure outsourcing of modular exponentiations under single untrusted programme modelEfficient and secure attribute-based signature for monotone predicatesA Dynamic Attribute-Based Authentication SchemeForward-secure revocable identity-based encryptionNew results and applications for multi-secret sharing schemesUniversally Composable Cryptographic Role-Based Access ControlUnlinkable policy-based sanitizable signaturesMultimodal private signaturesEnhanced Security of Attribute-Based SignaturesAttribute-based signatures for range of inner product and its applicationsSuccinct attribute-based signatures for bounded-size circuits by combining algebraic and arithmetic proofsHierarchical Attribute-Based SignaturesTraceable policy-based signatures and instantiation from latticesPolicy-compliant signaturesEfficient attribute-based signature for monotone predicatesAttribute-based signatures from RSAShort attribute-based signatures for arbitrary Turing machines from standard assumptionsFABSS: Attribute-Based Sanitizable Signature for Flexible Access StructureRevocable Attribute-Based Signatures with Adaptive Security in the Standard ModelDecentralized Attribute-Based SignaturesPredicate signatures from pair encodings via dual system proof techniqueHidden attribute-based signatures without anonymity revocationLattice-Based DAPS and Generalizations: Self-enforcement in Signature SchemesStronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient ConstructionsPolicy controlled system with anonymityEscrow free attribute-based signature with self-revealabilityBandwidth-efficient attribute-based key-insulated signatures with message recoveryAttribute-based key-insulated signature and its applicationsHomomorphic signatures for subset and superset mixed predicates and its applicationsPredicate aggregate signatures and applicationsBicameral and auditably private signaturesSignature for objects: formalizing how to authenticate physical data and moreCompact NIZKs from standard assumptions on bilinear mapsFormal Treatment of Privacy-Enhancing Credential SystemsPrivacy enhanced secure compact attribute-based signature from MQ problem for monotone span programFully dynamic attribute-based signatures for circuits from codesUpdatable policy-compliant signaturesAttribute-based signatures with advanced delegation, and tracingScalable attribute-based group key establishment: from~passive to active and deniableCompact NIZKs from standard assumptions on bilinear mapsBifurcated signatures: folding the accountability vs. anonymity dilemma into a single private signing schemeBlock-Wise P-Signatures and Non-interactive Anonymous Credentials with Efficient AttributesConstrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegationAttribute-based signcryption scheme based on linear codesAn \(r\)-hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked usersRevocable hierarchical attribute-based signatures from latticesPractical (fully) distributed signatures provably secure in the standard modelPartially structure-preserving signatures: lower bounds, constructions and more




Cites Work




This page was built for publication: Attribute-Based Signatures