Policy controlled system with anonymity
From MaRDI portal
Publication:1786597
DOI10.1016/J.TCS.2018.05.038zbMATH Open1408.94968OpenAlexW2808507275WikidataQ129655072 ScholiaQ129655072MaRDI QIDQ1786597FDOQ1786597
Authors: Pairat Thorncharoensri, Willy Susilo, Yi Mu
Publication date: 24 September 2018
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2018.05.038
Recommendations
Cites Work
- Security arguments for digital signatures and blind signatures
- Identity-Based Cryptosystems and Signature Schemes
- New directions in cryptography
- Title not available (Why is that?)
- Hierarchical ID-Based Cryptography
- Title not available (Why is that?)
- Title not available (Why is that?)
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
- Attribute-based signatures
- Title not available (Why is that?)
- Title not available (Why is that?)
- Policy-Based Signatures
- Information Security and Privacy
- Title not available (Why is that?)
- Progress in Cryptology - INDOCRYPT 2003
- Efficient Ring Signatures Without Random Oracles
- Efficient attribute-based signatures for non-monotone predicates in the standard model
- Threshold Attribute-Based Signcryption
- Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
- Designated Verifier Proofs and Their Applications
- Security in Communication Networks
- Information Security and Cryptology - ICISC 2003
- Short attribute-based signatures for threshold predicates
- ID-Based Blind Signature and Ring Signature from Pairings
- Public key cryptography -- PKC 2007. 10th international conference on practice and theory in public-key cryptography, Beijing, China, April 16--20, 2007. Proceedings.
- Theory of Cryptography
- Information and Communications Security
- Automata, Languages and Programming
- Information Security and Cryptology
- Multi-designated verifiers signatures: anonymity without encryption
- Traceable Ring Signature
- On the Security Models of (Threshold) Ring Signature Schemes
- Information Security and Cryptology - ICISC 2003
- Attribute-based signcryption scheme based on linear codes
- On the Power of Hierarchical Identity-Based Encryption
- Attribute-based signatures from RSA
- Attribute-Based Signatures for Circuits from Bilinear Map
- Revocable attribute-based signatures with adaptive security in the standard model
- Collusion-Free Policy-Based Encryption
- Title not available (Why is that?)
- Decentralized Attribute-Based Signatures
- Information and Communications Security
- Progress in Cryptology - INDOCRYPT 2004
- Financial Cryptography and Data Security
This page was built for publication: Policy controlled system with anonymity
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1786597)