Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems

From MaRDI portal
Revision as of 06:40, 5 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:3637141


DOI10.1007/978-3-642-02384-2_13zbMath1246.94048MaRDI QIDQ3637141

Siamak F. Shahandashti, Reihaneh Safavi-Naini

Publication date: 7 July 2009

Published in: Progress in Cryptology – AFRICACRYPT 2009 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-02384-2_13


94A60: Cryptography

94A62: Authentication, digital signatures and secret sharing


Related Items

Decentralized Attribute-Based Signatures, Generic Framework for Attribute-Based Group Signature, Succinct attribute-based signatures for bounded-size circuits by combining algebraic and arithmetic proofs, On the security of joint signature and encryption revisited, Attribute-based key-insulated signature and its applications, Policy controlled system with anonymity, Predicate signatures from pair encodings via dual system proof technique, Attribute-based signatures from lattices: unbounded attributes and semi-adaptive security, Cross-domain attribute-based access control encryption, Verifiable fully outsourced attribute-based signcryption system for IoT eHealth big data in cloud computing, Escrow free attribute-based signature with self-revealability, Bandwidth-efficient attribute-based key-insulated signatures with message recovery, An \(r\)-hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked users, Efficient and secure attribute-based signature for monotone predicates, Provably secure role-based encryption with revocation mechanism, Attribute-based signatures from RSA, Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions, Formal Treatment of Privacy-Enhancing Credential Systems, Short Attribute-Based Signatures for Threshold Predicates, Revocable Attribute-Based Signatures with Adaptive Security in the Standard Model, Attribute-Based Signatures, Block-Wise P-Signatures and Non-interactive Anonymous Credentials with Efficient Attributes, Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems



Cites Work