Attribute-based key-insulated signature and its applications
From MaRDI portal
Publication:726546
DOI10.1016/J.INS.2014.02.021zbMATH Open1341.94018OpenAlexW2026208406MaRDI QIDQ726546FDOQ726546
Authors: Yu Long, Jie Guo, Jian-hong Chen, Kefei Chen
Publication date: 11 July 2016
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2014.02.021
Recommendations
- Attribute Based Key-Insulated Signatures with Message Recovery
- Bandwidth-efficient attribute-based key-insulated signatures with message recovery
- Attribute-based key-insulated signature for Boolean formula
- Attribute-based signatures
- An Efficient Strong Key-Insulated Signature Scheme and Its Application
Cites Work
- Identity-based cryptosystems and signature schemes
- How to share a secret
- Hierarchical ID-Based Cryptography
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Fuzzy Identity-Based Encryption
- Attribute-based signatures
- On the Cryptographic Applications of Random Functions (Extended Abstract)
- Title not available (Why is that?)
- Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
- Fuzzy identity based signature with applications to biometric authentication
- A provable secure fuzzy identity based signature scheme
- Identity-Based Strong Key-Insulated Signature Without Random Oracles
- Strong Key-Insulated Signature Schemes
- Identity-Based Key-Insulated Signature with Secure Key-Updates
- Efficient Identity-Based Signatures Secure in the Standard Model
- Public Key Cryptography - PKC 2006
- Title not available (Why is that?)
- ID-Based Blind Signature and Ring Signature from Pairings
- An Identity-Based Signature from Gap Diffie-Hellman Groups
- Hidden attribute-based signatures without anonymity revocation
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction
- Identity-Based Threshold Key-Insulated Encryption without Random Oracles
- Efficient Intrusion-Resilient Signatures Without Random Oracles
- Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application
Cited In (8)
- Bandwidth-efficient attribute-based key-insulated signatures with message recovery
- Title not available (Why is that?)
- Attribute-based key-insulated signature for Boolean formula
- Attribute Based Key-Insulated Signatures with Message Recovery
- FABSS: Attribute-Based Sanitizable Signature for Flexible Access Structure
- Traceable policy-based signatures and instantiation from lattices
- Attribute-based signcryption scheme based on linear codes
- Privacy-preserving and efficient attributes proof based on selective aggregate CL-signature scheme
This page was built for publication: Attribute-based key-insulated signature and its applications
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q726546)