Attribute-based signatures
From MaRDI portal
Publication:3073718
DOI10.1007/978-3-642-19074-2_24zbMATH Open1284.94093OpenAlexW1517505812MaRDI QIDQ3073718FDOQ3073718
Authors: Hemanta K. Maji, Manoj Prabhakaran, Mike Rosulek
Publication date: 11 February 2011
Published in: Topics in Cryptology – CT-RSA 2011 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-19074-2_24
Recommendations
Cites Work
- Identity-based cryptosystems and signature schemes
- Identity-Based Encryption from the Weil Pairing
- Efficient Identity-Based Encryption Without Random Oracles
- Fuzzy Identity-Based Encryption
- Compact Group Signatures Without Random Oracles
- Group Signatures
- Title not available (Why is that?)
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Efficient Non-interactive Proof Systems for Bilinear Groups
- Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures
- Multi-authority Attribute Based Encryption
- Title not available (Why is that?)
- Mesh Signatures
- Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
- Security proofs for identity-based identification and signature schemes
- Advances in Cryptology – CRYPTO 2004
- Security in Communication Networks
- Oblivious signature-based envelope
Cited In (76)
- Bandwidth-efficient attribute-based key-insulated signatures with message recovery
- Hierarchical attribute-based signatures: short keys and optimal signature length
- New results and applications for multi-secret sharing schemes
- Dynamic attribute based group signature with attribute anonymity and tracing in the standard model
- Attribute-based group key establishment
- Forward-secure revocable identity-based encryption
- Attribute Based Key-Insulated Signatures with Message Recovery
- Attribute-based signatures with user-controlled linkability without random oracles
- Predicate signatures from pair encodings via dual system proof technique
- Secure outsourcing of modular exponentiations under single untrusted programme model
- Escrow free attribute-based signature with self-revealability
- A new lattice-based threshold attribute-based signature scheme
- Attribute-based signatures from lattices: unbounded attributes and semi-adaptive security
- Attribute-based signatures for unbounded circuits in the ROM and efficient instantiations from lattices
- Attribute-based key-insulated signature and its applications
- Practical (fully) distributed signatures provably secure in the standard model
- Attribute-based versions of Schnorr and ElGamal
- Lattice-Based DAPS and Generalizations: Self-enforcement in Signature Schemes
- Constrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegation
- Policy-based signature scheme from lattices
- Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
- Short attribute-based signatures for threshold predicates
- Policy-Based Signatures
- Partially structure-preserving signatures: lower bounds, constructions and more
- More efficient structure-preserving signatures -- or: bypassing the type-III lower bounds
- Scalable attribute-based group key establishment: from~passive to active and deniable
- Universally composable cryptographic role-based access control
- Verifiable fully outsourced attribute-based signcryption system for IoT eHealth big data in cloud computing
- Revocable attribute-based signatures with adaptive security in the standard model
- Policy controlled system with anonymity
- Decentralized attribute-based signatures
- Attribute-based signatures for circuits from bilinear map
- Attribute-based two-tier signatures: definition and construction
- Compact NIZKs from standard assumptions on bilinear maps
- Bifurcated signatures: folding the accountability vs. anonymity dilemma into a single private signing scheme
- Formal treatment of privacy-enhancing credential systems
- Attribute-based signcryption scheme based on linear codes
- On the security of joint signature and encryption revisited
- Hidden attribute-based signatures without anonymity revocation
- Hierarchical Attribute-Based Signatures
- Stronger security notions for decentralized traceable attribute-based signatures and more efficient constructions
- Efficient and secure attribute-based signature for monotone predicates
- Attribute-based signatures for circuits from multilinear maps
- Generic Framework for Attribute-Based Group Signature
- Attribute-based signatures from RSA
- Block-wise P-signatures and non-interactive anonymous credentials with efficient attributes
- An equivalence between attribute-based signatures and homomorphic signatures, and new constructions for both
- An \(r\)-hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked users
- Efficient attribute-based signature for monotone predicates
- Policy-compliant signatures
- Short attribute-based signatures for arbitrary Turing machines from standard assumptions
- Decentralized traceable attribute-based signatures
- Unlinkable policy-based sanitizable signatures
- Attribute-based signatures for unbounded languages from standard assumptions
- Revocable hierarchical attribute-based signatures from lattices
- Efficient attribute-based signatures for non-monotone predicates in the standard model
- Title not available (Why is that?)
- Succinct attribute-based signatures for bounded-size circuits by combining algebraic and arithmetic proofs
- Bicameral and auditably private signatures
- Predicate aggregate signatures and applications
- Attribute-based identification: definitions and efficient constructions
- A dynamic attribute-based authentication scheme
- Signature for objects: formalizing how to authenticate physical data and more
- Enhanced Security of Attribute-Based Signatures
- FABSS: Attribute-Based Sanitizable Signature for Flexible Access Structure
- Multi-authority attribute-based alterable threshold ring signature without central authority
- Compact NIZKs from standard assumptions on bilinear maps
- Attribute-based signatures with user-controlled linkability
- Multimodal private signatures
- Traceable policy-based signatures and instantiation from lattices
- Privacy enhanced secure compact attribute-based signature from MQ problem for monotone span program
- Fully dynamic attribute-based signatures for circuits from codes
- Updatable policy-compliant signatures
- Attribute-based signatures with advanced delegation, and tracing
- Homomorphic signatures for subset and superset mixed predicates and its applications
- Attribute-based signatures for range of inner product and its applications
This page was built for publication: Attribute-based signatures
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3073718)