An efficient attribute-based signature scheme with claim-predicate mechanism
暂无分享,去创建一个
[1] Xiaolei Dong,et al. Fuzzy identity based signature with applications to biometric authentication , 2011, Comput. Electr. Eng..
[2] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[3] Reihaneh Safavi-Naini,et al. Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems , 2009, AFRICACRYPT.
[4] Dalia Khader,et al. Attribute Based Group Signature with Revocation , 2007, IACR Cryptol. ePrint Arch..
[5] Guo Shaniqng,et al. Attribute-based Signature Scheme , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).
[6] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[7] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.
[8] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[9] Ling Cheung,et al. Provably secure ciphertext policy ABE , 2007, CCS '07.
[10] Xavier Boyen,et al. Mesh Signatures , 2007, EUROCRYPT.
[11] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[12] Dan Boneh,et al. Short Signatures Without Random Oracles , 2004, EUROCRYPT.
[13] Manoj Prabhakaran,et al. Attribute-Based Signatures , 2011, CT-RSA.
[14] Amit Sahai,et al. Bounded Ciphertext Policy Attribute Based Encryption , 2008, ICALP.
[15] Bok-Min Goi,et al. On the Security of an Attribute-Based Signature Scheme , 2009 .
[16] Yael Tauman Kalai,et al. How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.
[17] Liqun Chen,et al. An Interpretation of Identity-Based Cryptography , 2007, FOSAD.
[18] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[19] Stephen S. Yau,et al. Attribute-Based Signature with Policy-and-Endorsement Mechanism , 2010, Journal of Computer Science and Technology.
[20] Changji Wang. A provable secure fuzzy identity based signature scheme , 2011, Science China Information Sciences.