Wang, Q., Chen, S.: Attribute-based signature for threshold predicates from lat- tices. Security and Communication Networks 8(5), 811-821 (Mar 2015)Wang, Q., Chen, S.: Attribute-based signature for threshold predicates from lattices. Security and Communication Networks (2014) (in press)...
Based on this consideration, an attribute-based signature on lattices, which could resist quantum attacks, is proposed. This scheme employs “bonsai tree” techniques, and could be proved secure under the hardness assumption of small integer solution problem.Xian-ping Mao 毛贤平...
可追踪的基于属性的签名(Traceable attribute-based signature)是一种有效的密码学工具,在一些条件下可以在追踪真实签名者的同时保护真实签名者的身份。可追踪的基于属性的签名继承了基于属性签名的优点,每个签名者都可以对任何消息进行签名,并对身份信息进行细粒度访问控制(fine-grained access control)。 基于属性的签名(...
属性基签名(ABS)描述属性范围内的消息和谓词。有效的ABS Signature证明了这样一个事实:“属性满足谓词的单个用户背书了消息”。在这种非正式的安全保证中,我们强调“单一”这个词;ABS签名,就像在大多数基于属性的系统中一样,要求串通方不能将他们的属性集中在一起。而且,即使在有其他签名的情况下,属性基签名也不能...
Attribute-based signature (ABS) enables a signer, who possesses a set of attributes, to anonymously sign a message with respect to some signing policy. A recipient of the signature can just ensure that a signer owing attributes that satisfy the signing policy has indeed generated the...
云计算环境下基于属性的可净化签名方案 Attribute Based Sanitizable Signature Scheme in Cloud Computing 热度: Multi-Authority Attribute Based Encryption基于属性的加密多权威 热度: Attribute-BasedSignatures ∗ HemantaK.Maji † ManojPrabhakaran †
Gao, "Distributed Attribute-Based Signature with Attribute Dynamic Update for Smart Grid," in IEEE Transactions on Industrial Informatics, doi: 10.1109/TII.2022.3228688. 作者考虑的问题主要是电网中交易时,用户对交易用户的自由选择。为了实现这个功能,作者使用了属性来实现限制或者筛选。为了避免中心化机构的...
Gagné, M., Narayan, S., Safavi-Naini, R.: Short Pairing-Efficient Threshold-Attribute-Based Signature. In: Abdalla, M., Lange, T. (eds.) Pairing 2012. LNCS, vol. 7708, pp. 295–313. Springer, Heidelberg (2013) Chapter Google Scholar Galbraith, S., Paterson, K., Smart, N.P....
under the signature-policy framework by using the linear secretsharing scheme (LSSS), and it is proved to be secure in the security model of strong unforgeability against chosen-message attacks (SUCMA). Theoretical analyses and experimental evaluations show ...
This paper presents the first attribute-based signature (ABS) scheme in which the correspondence between signers and signatures is captured in an arithmetic model of computation. Specifically, we design a fully secure, i.e., adaptively unforgeable and perfectly signer-private ABS scheme for signing...