Attribute-based signatures
From MaRDI portal
Publication:3073718
Recommendations
Cites work
- scientific article; zbMATH DE number 2009983 (Why is no real title available?)
- scientific article; zbMATH DE number 2081086 (Why is no real title available?)
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Advances in Cryptology – CRYPTO 2004
- Compact Group Signatures Without Random Oracles
- Efficient Identity-Based Encryption Without Random Oracles
- Efficient Non-interactive Proof Systems for Bilinear Groups
- Fuzzy Identity-Based Encryption
- Group Signatures
- Identity-Based Encryption from the Weil Pairing
- Identity-based cryptosystems and signature schemes
- Mesh Signatures
- Multi-authority Attribute Based Encryption
- Oblivious signature-based envelope
- Security in Communication Networks
- Security proofs for identity-based identification and signature schemes
- Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures
- Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
Cited in
(77)- Enhanced Security of Attribute-Based Signatures
- A dynamic attribute-based authentication scheme
- Multimodal private signatures
- Signature for objects: formalizing how to authenticate physical data and more
- FABSS: Attribute-Based Sanitizable Signature for Flexible Access Structure
- Homomorphic signatures for subset and superset mixed predicates and its applications
- Traceable policy-based signatures and instantiation from lattices
- Attribute-based signatures with advanced delegation, and tracing
- Succinct attribute-based signatures for bounded-size circuits by combining algebraic and arithmetic proofs
- Compact NIZKs from standard assumptions on bilinear maps
- Attribute-based identification: definitions and efficient constructions
- Attribute-based signatures for range of inner product and its applications
- Privacy enhanced secure compact attribute-based signature from MQ problem for monotone span program
- Multi-authority attribute-based alterable threshold ring signature without central authority
- Fully dynamic attribute-based signatures for circuits from codes
- Updatable policy-compliant signatures
- scientific article; zbMATH DE number 6263228 (Why is no real title available?)
- Bicameral and auditably private signatures
- Predicate aggregate signatures and applications
- Attribute-based signatures with user-controlled linkability
- Lattice-Based DAPS and Generalizations: Self-enforcement in Signature Schemes
- Revocable hierarchical attribute-based signatures from lattices
- Practical (fully) distributed signatures provably secure in the standard model
- Generic Framework for Attribute-Based Group Signature
- Attribute-based signatures from RSA
- Verifiable fully outsourced attribute-based signcryption system for IoT eHealth big data in cloud computing
- Block-wise P-signatures and non-interactive anonymous credentials with efficient attributes
- Attribute-based signatures for supporting anonymous certification
- More efficient structure-preserving signatures -- or: bypassing the type-III lower bounds
- Attribute-based signcryption scheme based on linear codes
- Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
- A new lattice-based threshold attribute-based signature scheme
- Attribute-based signatures for circuits from bilinear map
- An equivalence between attribute-based signatures and homomorphic signatures, and new constructions for both
- Attribute-based two-tier signatures: definition and construction
- Compact NIZKs from standard assumptions on bilinear maps
- Bifurcated signatures: folding the accountability vs. anonymity dilemma into a single private signing scheme
- New results and applications for multi-secret sharing schemes
- Forward-secure revocable identity-based encryption
- On the security of joint signature and encryption revisited
- Scalable attribute-based group key establishment: from~passive to active and deniable
- Short attribute-based signatures for threshold predicates
- Hidden attribute-based signatures without anonymity revocation
- Formal treatment of privacy-enhancing credential systems
- Policy-Based Signatures
- Secure outsourcing of modular exponentiations under single untrusted programme model
- Escrow free attribute-based signature with self-revealability
- Constrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegation
- Policy-based signature scheme from lattices
- Attribute-based versions of Schnorr and ElGamal
- Stronger security notions for decentralized traceable attribute-based signatures and more efficient constructions
- Hierarchical Attribute-Based Signatures
- Attribute-based key-insulated signature and its applications
- Attribute-based signatures for unbounded languages from standard assumptions
- Bandwidth-efficient attribute-based key-insulated signatures with message recovery
- Efficient and secure attribute-based signature for monotone predicates
- Efficient attribute-based signature for monotone predicates
- Policy-compliant signatures
- Attribute Based Key-Insulated Signatures with Message Recovery
- Short attribute-based signatures for arbitrary Turing machines from standard assumptions
- Revocable attribute-based signatures with adaptive security in the standard model
- Attribute-based signatures with user-controlled linkability without random oracles
- Hierarchical attribute-based signatures: short keys and optimal signature length
- Attribute-based signatures from lattices: unbounded attributes and semi-adaptive security
- An \(r\)-hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked users
- Dynamic attribute based group signature with attribute anonymity and tracing in the standard model
- Partially structure-preserving signatures: lower bounds, constructions and more
- Policy controlled system with anonymity
- Efficient attribute-based signatures for non-monotone predicates in the standard model
- Predicate signatures from pair encodings via dual system proof technique
- Attribute-based signatures for circuits from multilinear maps
- Attribute-based signatures for unbounded circuits in the ROM and efficient instantiations from lattices
- Decentralized traceable attribute-based signatures
- Unlinkable policy-based sanitizable signatures
- Decentralized attribute-based signatures
- Attribute-based group key establishment
- Universally composable cryptographic role-based access control
This page was built for publication: Attribute-based signatures
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3073718)