Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
From MaRDI portal
Publication:3637141
DOI10.1007/978-3-642-02384-2_13zbMath1246.94048MaRDI QIDQ3637141
Reihaneh Safavi-Naini, Siamak F. Shahandashti
Publication date: 7 July 2009
Published in: Progress in Cryptology – AFRICACRYPT 2009 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-02384-2_13
Related Items
Decentralized Attribute-Based Signatures, On the security of joint signature and encryption revisited, Attribute-based key-insulated signature and its applications, Efficient and secure attribute-based signature for monotone predicates, Provably secure role-based encryption with revocation mechanism, Attribute-based signatures from RSA, Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions, Formal Treatment of Privacy-Enhancing Credential Systems, Short Attribute-Based Signatures for Threshold Predicates, Revocable Attribute-Based Signatures with Adaptive Security in the Standard Model, Attribute-Based Signatures, Block-Wise P-Signatures and Non-interactive Anonymous Credentials with Efficient Attributes, Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Identity-Based Cryptosystems and Signature Schemes
- Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
- The Knowledge Complexity of Interactive Proof Systems
- Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
- Hierarchical ID-Based Cryptography
- Advances in Cryptology - EUROCRYPT 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Fuzzy Identity-Based Encryption