Attribute-based key-insulated signature and its applications
From MaRDI portal
(Redirected from Publication:726546)
Recommendations
- Attribute Based Key-Insulated Signatures with Message Recovery
- Bandwidth-efficient attribute-based key-insulated signatures with message recovery
- Attribute-based key-insulated signature for Boolean formula
- Attribute-based signatures
- An Efficient Strong Key-Insulated Signature Scheme and Its Application
Cites work
- scientific article; zbMATH DE number 1583774 (Why is no real title available?)
- scientific article; zbMATH DE number 1617944 (Why is no real title available?)
- scientific article; zbMATH DE number 1942440 (Why is no real title available?)
- scientific article; zbMATH DE number 1951619 (Why is no real title available?)
- scientific article; zbMATH DE number 1962140 (Why is no real title available?)
- scientific article; zbMATH DE number 2009960 (Why is no real title available?)
- scientific article; zbMATH DE number 2086699 (Why is no real title available?)
- scientific article; zbMATH DE number 2086721 (Why is no real title available?)
- scientific article; zbMATH DE number 1842494 (Why is no real title available?)
- scientific article; zbMATH DE number 1418310 (Why is no real title available?)
- A provable secure fuzzy identity based signature scheme
- An Identity-Based Signature from Gap Diffie-Hellman Groups
- Attribute-based signatures
- Efficient Identity-Based Signatures Secure in the Standard Model
- Efficient Intrusion-Resilient Signatures Without Random Oracles
- Fuzzy Identity-Based Encryption
- Fuzzy identity based signature with applications to biometric authentication
- Hidden attribute-based signatures without anonymity revocation
- Hierarchical ID-Based Cryptography
- How to share a secret
- ID-Based Blind Signature and Ring Signature from Pairings
- Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application
- Identity-Based Key-Insulated Signature with Secure Key-Updates
- Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction
- Identity-Based Strong Key-Insulated Signature Without Random Oracles
- Identity-Based Threshold Key-Insulated Encryption without Random Oracles
- Identity-based cryptosystems and signature schemes
- On the Cryptographic Applications of Random Functions (Extended Abstract)
- Public Key Cryptography - PKC 2006
- Strong Key-Insulated Signature Schemes
- Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
Cited in
(8)- Attribute-based signcryption scheme based on linear codes
- FABSS: Attribute-Based Sanitizable Signature for Flexible Access Structure
- Traceable policy-based signatures and instantiation from lattices
- Bandwidth-efficient attribute-based key-insulated signatures with message recovery
- Attribute Based Key-Insulated Signatures with Message Recovery
- Privacy-preserving and efficient attributes proof based on selective aggregate CL-signature scheme
- Attribute-based key-insulated signature for Boolean formula
- scientific article; zbMATH DE number 6263228 (Why is no real title available?)
This page was built for publication: Attribute-based key-insulated signature and its applications
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q726546)