Short Attribute-Based Signatures for Threshold Predicates
From MaRDI portal
Publication:2889994
DOI10.1007/978-3-642-27954-6_4zbMath1292.94075MaRDI QIDQ2889994
Benoît Libert, Fabien Laguillaumie, Javier Herranz, Carla Ràfols
Publication date: 8 June 2012
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: http://hdl.handle.net/10230/42263
94A60: Cryptography
Related Items
Generic Framework for Attribute-Based Group Signature, New results and applications for multi-secret sharing schemes, Scalable attribute-based group key establishment: from~passive to active and deniable, Policy controlled system with anonymity, Verifiable fully outsourced attribute-based signcryption system for IoT eHealth big data in cloud computing, A blind coupon mechanism enabling veto voting over unreliable networks, Bandwidth-efficient attribute-based key-insulated signatures with message recovery, An \(r\)-hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked users, Practical (fully) distributed signatures provably secure in the standard model, Efficient and secure attribute-based signature for monotone predicates, Attribute-based signatures from RSA, Efficient attribute-based signature for monotone predicates, Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions, Short Attribute-Based Signatures for Threshold Predicates
Cites Work
- Unnamed Item
- Unnamed Item
- Hierarchical threshold secret sharing
- Hidden attribute-based signatures without anonymity revocation
- Extensions of access structures and their cryptographic applications
- Short Attribute-Based Signatures for Threshold Predicates
- Signatures Resilient to Continual Leakage on Memory and Computation
- Revocable Attribute-Based Signatures with Adaptive Security in the Standard Model
- Attribute-Based Signatures
- Efficient Attribute-Based Signatures for Non-monotone Predicates in the Standard Model
- Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts
- Constant Size Ciphertexts in Threshold Attribute-Based Encryption
- Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
- Programmable Hash Functions and Their Applications
- Dynamic Threshold Public-Key Encryption
- Generalized Identity Based and Broadcast Encryption Schemes
- Homomorphic Encryption and Signatures from Vector Decomposition
- Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Fuzzy Identity-Based Encryption
- Advances in Cryptology - CRYPTO 2003
- Mesh Signatures
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Efficient Non-interactive Proof Systems for Bilinear Groups
- On Signatures of Knowledge