Attribute-Based Signatures
From MaRDI portal
Publication:3073718
DOI10.1007/978-3-642-19074-2_24zbMath1284.94093OpenAlexW1517505812MaRDI QIDQ3073718
Mike Rosulek, Hemanta K. Maji, Manoj Prabhakaran
Publication date: 11 February 2011
Published in: Topics in Cryptology – CT-RSA 2011 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-19074-2_24
Related Items (46)
Short Attribute-Based Signatures for Threshold Predicates ⋮ Attribute-based signatures from lattices: unbounded attributes and semi-adaptive security ⋮ Policy-based signature scheme from lattices ⋮ Generic Framework for Attribute-Based Group Signature ⋮ Attribute-based versions of Schnorr and ElGamal ⋮ Verifiable fully outsourced attribute-based signcryption system for IoT eHealth big data in cloud computing ⋮ On the security of joint signature and encryption revisited ⋮ More efficient structure-preserving signatures -- or: bypassing the type-III lower bounds ⋮ Secure outsourcing of modular exponentiations under single untrusted programme model ⋮ Efficient and secure attribute-based signature for monotone predicates ⋮ A Dynamic Attribute-Based Authentication Scheme ⋮ Forward-secure revocable identity-based encryption ⋮ New results and applications for multi-secret sharing schemes ⋮ Universally Composable Cryptographic Role-Based Access Control ⋮ Unlinkable policy-based sanitizable signatures ⋮ Multimodal private signatures ⋮ Enhanced Security of Attribute-Based Signatures ⋮ Attribute-based signatures for range of inner product and its applications ⋮ Succinct attribute-based signatures for bounded-size circuits by combining algebraic and arithmetic proofs ⋮ Hierarchical Attribute-Based Signatures ⋮ Traceable policy-based signatures and instantiation from lattices ⋮ Policy-compliant signatures ⋮ Efficient attribute-based signature for monotone predicates ⋮ Attribute-based signatures from RSA ⋮ Short attribute-based signatures for arbitrary Turing machines from standard assumptions ⋮ FABSS: Attribute-Based Sanitizable Signature for Flexible Access Structure ⋮ Revocable Attribute-Based Signatures with Adaptive Security in the Standard Model ⋮ Decentralized Attribute-Based Signatures ⋮ Predicate signatures from pair encodings via dual system proof technique ⋮ Hidden attribute-based signatures without anonymity revocation ⋮ Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions ⋮ Policy controlled system with anonymity ⋮ Escrow free attribute-based signature with self-revealability ⋮ Bandwidth-efficient attribute-based key-insulated signatures with message recovery ⋮ Attribute-based key-insulated signature and its applications ⋮ Formal Treatment of Privacy-Enhancing Credential Systems ⋮ Scalable attribute-based group key establishment: from~passive to active and deniable ⋮ Compact NIZKs from standard assumptions on bilinear maps ⋮ Bifurcated signatures: folding the accountability vs. anonymity dilemma into a single private signing scheme ⋮ Block-Wise P-Signatures and Non-interactive Anonymous Credentials with Efficient Attributes ⋮ Constrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegation ⋮ Attribute-based signcryption scheme based on linear codes ⋮ An \(r\)-hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked users ⋮ Revocable hierarchical attribute-based signatures from lattices ⋮ Practical (fully) distributed signatures provably secure in the standard model ⋮ Partially structure-preserving signatures: lower bounds, constructions and more
Cites Work
- Unnamed Item
- Unnamed Item
- Security proofs for identity-based identification and signature schemes
- Identity-Based Cryptosystems and Signature Schemes
- Compact Group Signatures Without Random Oracles
- Multi-authority Attribute Based Encryption
- Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
- Group Signatures
- Identity-Based Encryption from the Weil Pairing
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Advances in Cryptology – CRYPTO 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Fuzzy Identity-Based Encryption
- Mesh Signatures
- Efficient Non-interactive Proof Systems for Bilinear Groups
- Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures
- Security in Communication Networks
- Oblivious signature-based envelope
This page was built for publication: Attribute-Based Signatures