Unfortunately, there does not exist an attributebased signature which is resistance to the quantum attacks. This means we do not have secure attribute-based signature schemes in a post-quantum world. Based on this consideration, an attribute-based signature on lattices, which could resist quantum ...
可追踪的基于属性的签名(Traceable attribute-based signature)是一种有效的密码学工具,在一些条件下可以在追踪真实签名者的同时保护真实签名者的身份。可追踪的基于属性的签名继承了基于属性签名的优点,每个签名者都可以对任何消息进行签名,并对身份信息进行细粒度访问控制(fine-grained access control)。 基于属性的签名(...
有效的ABS Signature证明了这样一个事实:“属性满足谓词的单个用户背书了消息”。在这种非正式的安全保证中,我们强调“单一”这个词;ABS签名,就像在大多数基于属性的系统中一样,要求串通方不能将他们的属性集中在一起。而且,即使在有其他签名的情况下,属性基签名也不能透露更多关于属性的声明。
PrivacySecurity analysisAttribute-based signature (ABS) enables a signer, who possesses a set of attributes, to anonymously sign a message with respect to some signing policy. A recipient of the signature can just ensure that a signer owing attributes that satisfy the signing policy has...
云计算环境下基于属性的可净化签名方案 Attribute Based Sanitizable Signature Scheme in Cloud Computing 热度: Multi-Authority Attribute Based Encryption基于属性的加密多权威 热度: Attribute-BasedSignatures ∗ HemantaK.Maji † ManojPrabhakaran †
Gao, "Distributed Attribute-Based Signature with Attribute Dynamic Update for Smart Grid," in IEEE Transactions on Industrial Informatics, doi: 10.1109/TII.2022.3228688. 作者考虑的问题主要是电网中交易时,用户对交易用户的自由选择。为了实现这个功能,作者使用了属性来实现限制或者筛选。为了避免中心化机构的...
heterogeneous, openness, and diversity make it suffer from various security challenges such as authentication and access control problems. Attribute-based signature (ABS) is a promising cryptographic tool for addressing the above concerns, however, ...
An attribute-based signature scheme is a digital signature scheme proposed in 2008 by Maji et al.,in which a message is associated with a signing policy, where the signing policy is described as a boolean formula over a signers' attributes. Only when a signer's attributes satisfy the signing...
Attribute-based signature (ABS) is a promising cryptographic primitive. It allows the signer to generate a signature with attributes satisfying the predicate without leaking more information, so as to provide message authenticity in an anonymous manner. However, drawbacks concerning security and efficiency...
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985) CrossRef Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. ...