Attribute-based key-insulated signature and its applications
From MaRDI portal
Publication:726546
DOI10.1016/j.ins.2014.02.021zbMath1341.94018OpenAlexW2026208406MaRDI QIDQ726546
Yu Long, Jie Guo, Jian-hong Chen, Ke-Fei Chen
Publication date: 11 July 2016
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2014.02.021
Related Items (4)
Traceable policy-based signatures and instantiation from lattices ⋮ Attribute-based key-insulated signature for boolean formula ⋮ Bandwidth-efficient attribute-based key-insulated signatures with message recovery ⋮ Attribute-based signcryption scheme based on linear codes
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A provable secure fuzzy identity based signature scheme
- Hidden attribute-based signatures without anonymity revocation
- Fuzzy identity based signature with applications to biometric authentication
- Identity-Based Cryptosystems and Signature Schemes
- On the Cryptographic Applications of Random Functions (Extended Abstract)
- How to share a secret
- Attribute-Based Signatures
- Identity-Based Strong Key-Insulated Signature Without Random Oracles
- Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
- ID-Based Blind Signature and Ring Signature from Pairings
- Hierarchical ID-Based Cryptography
- An Identity-Based Signature from Gap Diffie-Hellman Groups
- Strong Key-Insulated Signature Schemes
- Identity-Based Key-Insulated Signature with Secure Key-Updates
- Efficient Intrusion-Resilient Signatures Without Random Oracles
- Fuzzy Identity-Based Encryption
- Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application
- Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction
- Identity-Based Threshold Key-Insulated Encryption without Random Oracles
- Efficient Identity-Based Signatures Secure in the Standard Model
- Public Key Cryptography - PKC 2006
This page was built for publication: Attribute-based key-insulated signature and its applications