The following pages link to Attribute-Based Signatures (Q3073718):
Displaying 40 items.
- Policy-based signature scheme from lattices (Q306050) (← links)
- On the security of joint signature and encryption revisited (Q350517) (← links)
- New results and applications for multi-secret sharing schemes (Q404940) (← links)
- Attribute-based key-insulated signature and its applications (Q726546) (← links)
- Scalable attribute-based group key establishment: from~passive to active and deniable (Q744010) (← links)
- Attribute-based signcryption scheme based on linear codes (Q778458) (← links)
- Hidden attribute-based signatures without anonymity revocation (Q975862) (← links)
- Policy controlled system with anonymity (Q1786597) (← links)
- Predicate signatures from pair encodings via dual system proof technique (Q2009416) (← links)
- Compact NIZKs from standard assumptions on bilinear maps (Q2055661) (← links)
- Bifurcated signatures: folding the accountability vs. anonymity dilemma into a single private signing scheme (Q2056805) (← links)
- Revocable hierarchical attribute-based signatures from lattices (Q2096621) (← links)
- Partially structure-preserving signatures: lower bounds, constructions and more (Q2117038) (← links)
- Attribute-based signatures from lattices: unbounded attributes and semi-adaptive security (Q2132442) (← links)
- Verifiable fully outsourced attribute-based signcryption system for IoT eHealth big data in cloud computing (Q2160720) (← links)
- More efficient structure-preserving signatures -- or: bypassing the type-III lower bounds (Q2167723) (← links)
- Escrow free attribute-based signature with self-revealability (Q2282038) (← links)
- Bandwidth-efficient attribute-based key-insulated signatures with message recovery (Q2282075) (← links)
- Constrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegation (Q2319626) (← links)
- An \(r\)-hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked users (Q2336893) (← links)
- Practical (fully) distributed signatures provably secure in the standard model (Q2354772) (← links)
- Secure outsourcing of modular exponentiations under single untrusted programme model (Q2403228) (← links)
- Efficient and secure attribute-based signature for monotone predicates (Q2406435) (← links)
- Attribute-based signatures from RSA (Q2437776) (← links)
- Attribute-based versions of Schnorr and ElGamal (Q2634583) (← links)
- Forward-secure revocable identity-based encryption (Q2673062) (← links)
- Policy-compliant signatures (Q2697898) (← links)
- Efficient attribute-based signature for monotone predicates (Q2697932) (← links)
- Short attribute-based signatures for arbitrary Turing machines from standard assumptions (Q2701493) (← links)
- Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions (Q2790054) (← links)
- Formal Treatment of Privacy-Enhancing Credential Systems (Q2807189) (← links)
- Short Attribute-Based Signatures for Threshold Predicates (Q2889994) (← links)
- A Dynamic Attribute-Based Authentication Scheme (Q2947073) (← links)
- Universally Composable Cryptographic Role-Based Access Control (Q2953848) (← links)
- Revocable Attribute-Based Signatures with Adaptive Security in the Standard Model (Q3011915) (← links)
- Block-Wise P-Signatures and Non-interactive Anonymous Credentials with Efficient Attributes (Q3104713) (← links)
- FABSS: Attribute-Based Sanitizable Signature for Flexible Access Structure (Q3297474) (← links)
- Decentralized Attribute-Based Signatures (Q4916005) (← links)
- Generic Framework for Attribute-Based Group Signature (Q5056041) (← links)
- Traceable policy-based signatures and instantiation from lattices (Q6195214) (← links)