Decentralized attribute-based signatures
From MaRDI portal
Publication:4916005
DOI10.1007/978-3-642-36362-7_9zbMATH Open1314.94106OpenAlexW137962550MaRDI QIDQ4916005FDOQ4916005
Tatsuaki Okamoto, Katsuyuki Takashima
Publication date: 19 April 2013
Published in: Public-Key Cryptography – PKC 2013 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-36362-7_9
Recommendations
Cites Work
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Title not available (Why is that?)
- Advances in Cryptology – CRYPTO 2004
- P-signatures and Noninteractive Anonymous Credentials
- Fully secure functional encryption with general relations from the decisional linear assumption
- Multi-authority Attribute Based Encryption
- Title not available (Why is that?)
- Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting
- Attribute-Based Signatures
- Randomizable Proofs and Delegatable Anonymous Credentials
- Title not available (Why is that?)
- Mesh Signatures
- Efficient Ring Signatures Without Random Oracles
- Efficient Attribute-Based Signatures for Non-monotone Predicates in the Standard Model
- Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
- Decentralizing Attribute-Based Encryption
- Advances in cryptology -- CRYPTO 2009. 29th annual international cryptology conference, Santa Barbara, CA, USA, August 16--20, 2009. Proceedings
- Revocable Attribute-Based Signatures with Adaptive Security in the Standard Model
- Compact Hardware for Computing the Tate Pairing over 128-Bit-Security Supersingular Curves
Cited In (21)
- A practical compiler for attribute-based encryption: new decentralized constructions and more
- A novel lightweight decentralized attribute-based signature scheme for social co-governance
- Revocable Decentralized Multi-Authority Functional Encryption
- Predicate signatures from pair encodings via dual system proof technique
- Escrow free attribute-based signature with self-revealability
- Attribute-based signatures from lattices: unbounded attributes and semi-adaptive security
- Practical (fully) distributed signatures provably secure in the standard model
- Multi-authority ABE for non-monotonic access structures
- Verifiable fully outsourced attribute-based signcryption system for IoT eHealth big data in cloud computing
- Policy controlled system with anonymity
- Privacy enhanced secure compact attribute-based signature from MQ problem for monotone span program
- Fully dynamic attribute-based signatures for circuits from codes
- Registered attribute-based signature
- Decentralized policy-hiding ABE with receiver privacy
- Attribute-based signatures with advanced delegation, and tracing
- Hierarchical Attribute-Based Signatures
- Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice
- A multi-authority approach to various predicate encryption types
- An \(r\)-hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked users
- Efficient attribute-based signature for monotone predicates
- Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions
This page was built for publication: Decentralized attribute-based signatures
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4916005)