Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
From MaRDI portal
Publication:3637141
DOI10.1007/978-3-642-02384-2_13zbMath1246.94048OpenAlexW2096113448MaRDI QIDQ3637141
Siamak F. Shahandashti, Reihaneh Safavi-Naini
Publication date: 7 July 2009
Published in: Progress in Cryptology – AFRICACRYPT 2009 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-02384-2_13
Related Items (24)
Short Attribute-Based Signatures for Threshold Predicates ⋮ Attribute-based signatures from lattices: unbounded attributes and semi-adaptive security ⋮ Generic Framework for Attribute-Based Group Signature ⋮ Cross-domain attribute-based access control encryption ⋮ Verifiable fully outsourced attribute-based signcryption system for IoT eHealth big data in cloud computing ⋮ On the security of joint signature and encryption revisited ⋮ Efficient and secure attribute-based signature for monotone predicates ⋮ Succinct attribute-based signatures for bounded-size circuits by combining algebraic and arithmetic proofs ⋮ A novel lightweight decentralized attribute-based signature scheme for social co-governance ⋮ Provably secure role-based encryption with revocation mechanism ⋮ Attribute-based signatures from RSA ⋮ Revocable Attribute-Based Signatures with Adaptive Security in the Standard Model ⋮ Decentralized Attribute-Based Signatures ⋮ Predicate signatures from pair encodings via dual system proof technique ⋮ Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions ⋮ Policy controlled system with anonymity ⋮ Escrow free attribute-based signature with self-revealability ⋮ Bandwidth-efficient attribute-based key-insulated signatures with message recovery ⋮ Attribute-based key-insulated signature and its applications ⋮ Attribute-Based Signatures ⋮ Formal Treatment of Privacy-Enhancing Credential Systems ⋮ Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems ⋮ Block-Wise P-Signatures and Non-interactive Anonymous Credentials with Efficient Attributes ⋮ An \(r\)-hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked users
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Identity-Based Cryptosystems and Signature Schemes
- Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
- The Knowledge Complexity of Interactive Proof Systems
- Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
- Hierarchical ID-Based Cryptography
- Advances in Cryptology - EUROCRYPT 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Fuzzy Identity-Based Encryption
This page was built for publication: Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems