Efficient and secure attribute-based signature for monotone predicates
暂无分享,去创建一个
Weijia Jia | Ke Gu | Guojun Wang | Sheng Wen | S. Wen | Guojun Wang | Ke Gu | W. Jia
[1] Amit Sahai,et al. Bounded Ciphertext Policy Attribute Based Encryption , 2008, ICALP.
[2] Guo Shaniqng,et al. Attribute-based Signature Scheme , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).
[3] Yan Zhang,et al. On the Security of an Efficient Attribute-Based Signature , 2013, NSS.
[4] Jie Gu,et al. An efficient and practicable anonymous authentication scheme using smart cards , 2010, 2010 IEEE International Conference on Information Theory and Information Security.
[5] Javier Herranz,et al. Short Attribute-Based Signatures for Threshold Predicates , 2012, CT-RSA.
[6] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[7] P. MuraliKrishna,et al. SECURE SCHEMES FOR SECRET SHARING AND KEY DISTRIBUTION USING PELL'S EQUATION , 2013 .
[8] Dan Boneh,et al. Short Signatures Without Random Oracles , 2004, EUROCRYPT.
[9] Dongqing Xie,et al. Attribute-based signature and its applications , 2010, ASIACCS '10.
[10] Hovav Shacham,et al. Randomizable Proofs and Delegatable Anonymous Credentials , 2009, CRYPTO.
[11] Dalia Khader,et al. Attribute Based Group Signature with Revocation , 2007, IACR Cryptol. ePrint Arch..
[12] Amit Sahai,et al. Efficient Non-interactive Proof Systems for Bilinear Groups , 2008, EUROCRYPT.
[13] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[14] Cheng Chen,et al. Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures , 2013, CT-RSA.
[15] Ling Cheung,et al. Provably secure ciphertext policy ABE , 2007, CCS '07.
[16] Brent Waters,et al. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.
[17] Markulf Kohlweiss,et al. P-signatures and Noninteractive Anonymous Credentials , 2008, TCC.
[18] Moti Yung,et al. Scalable Group Signatures with Revocation , 2012, EUROCRYPT.
[19] Avi Wigderson,et al. On span programs , 1993, [1993] Proceedings of the Eigth Annual Structure in Complexity Theory Conference.
[20] Jonathan Katz,et al. Ring Signatures: Stronger Definitions, and Constructions without Random Oracles , 2005, IACR Cryptol. ePrint Arch..
[21] Tatsuaki Okamoto,et al. Efficient Attribute-Based Signatures for Non-Monotone Predicates in the Standard Model , 2014, IEEE Transactions on Cloud Computing.
[22] Reihaneh Safavi-Naini,et al. Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems , 2009, AFRICACRYPT.
[23] Manoj Prabhakaran,et al. Attribute-Based Signatures , 2011, CT-RSA.
[24] Jin Li,et al. Attribute-Based Ring Signatures , 2008, IACR Cryptol. ePrint Arch..
[25] Xavier Boyen,et al. Mesh Signatures , 2007, EUROCRYPT.
[26] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[27] Dalia Khader,et al. Attribute Based Group Signatures , 2007, IACR Cryptol. ePrint Arch..