Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems

From MaRDI portal
Publication:3637141

DOI10.1007/978-3-642-02384-2_13zbMath1246.94048OpenAlexW2096113448MaRDI QIDQ3637141

Siamak F. Shahandashti, Reihaneh Safavi-Naini

Publication date: 7 July 2009

Published in: Progress in Cryptology – AFRICACRYPT 2009 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-02384-2_13




Related Items (24)

Short Attribute-Based Signatures for Threshold PredicatesAttribute-based signatures from lattices: unbounded attributes and semi-adaptive securityGeneric Framework for Attribute-Based Group SignatureCross-domain attribute-based access control encryptionVerifiable fully outsourced attribute-based signcryption system for IoT eHealth big data in cloud computingOn the security of joint signature and encryption revisitedEfficient and secure attribute-based signature for monotone predicatesSuccinct attribute-based signatures for bounded-size circuits by combining algebraic and arithmetic proofsA novel lightweight decentralized attribute-based signature scheme for social co-governanceProvably secure role-based encryption with revocation mechanismAttribute-based signatures from RSARevocable Attribute-Based Signatures with Adaptive Security in the Standard ModelDecentralized Attribute-Based SignaturesPredicate signatures from pair encodings via dual system proof techniqueStronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient ConstructionsPolicy controlled system with anonymityEscrow free attribute-based signature with self-revealabilityBandwidth-efficient attribute-based key-insulated signatures with message recoveryAttribute-based key-insulated signature and its applicationsAttribute-Based SignaturesFormal Treatment of Privacy-Enhancing Credential SystemsThreshold Attribute-Based Signatures and Their Application to Anonymous Credential SystemsBlock-Wise P-Signatures and Non-interactive Anonymous Credentials with Efficient AttributesAn \(r\)-hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked users



Cites Work


This page was built for publication: Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems