Attribute-based signatures from RSA
From MaRDI portal
Publication:2437776
DOI10.1016/J.TCS.2014.01.028zbMATH Open1288.68060OpenAlexW2055221375MaRDI QIDQ2437776FDOQ2437776
Authors: Javier Herranz
Publication date: 13 March 2014
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2014.01.028
Recommendations
- Attribute-based signatures
- Revocable attribute-based signatures with adaptive security in the standard model
- Short attribute-based signatures for threshold predicates
- Attribute-based signatures for circuits from bilinear map
- Attribute-based signatures for unbounded circuits in the ROM and efficient instantiations from lattices
Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Security arguments for digital signatures and blind signatures
- Universal Accumulators with Efficient Nonmembership Proofs
- Title not available (Why is that?)
- Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption
- Attribute-based signatures
- Title not available (Why is that?)
- Efficient attribute-based signatures for non-monotone predicates in the standard model
- Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
- Short attribute-based signatures for threshold predicates
- Progress in Cryptology – Mycrypt 2005
- Distributed ring signatures from general dual access structures
- Revocable attribute-based signatures with adaptive security in the standard model
Cited In (12)
- Title not available (Why is that?)
- Attribute Based Key-Insulated Signatures with Message Recovery
- Attribute-based versions of Schnorr and ElGamal
- Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
- Revocable attribute-based signatures with adaptive security in the standard model
- Policy controlled system with anonymity
- Fully dynamic attribute-based signatures for circuits from codes
- Attribute-based signatures
- Hidden attribute-based signatures without anonymity revocation
- Hierarchical Attribute-Based Signatures
- Policy-compliant signatures
- Revocable hierarchical attribute-based signatures from lattices
This page was built for publication: Attribute-based signatures from RSA
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2437776)