Summary: We introduce Attribute-Based Signatures (ABS), a versatile primitive that allows a party to sign a message with fine-grained control over identifying information. In ABS, a signer, who possesses a set of attributes from the authority, can sign a message with a predicate that is ...
attribute-basedsignatures:基于属性的签名
Why attribute-based signatures? The kind of authentication required in an attribute-based system differs from that offered by digital signatures, in much the same way public-key encryption does not fit the bill for attribute- based encryption. An attribute-based solution requires a richer ...
Attribute-based signaturesArithmetic branching programsArithmetic span programsConcrete efficiencyUnbounded multi-use of attributesBilinear groupsThis paper presents the first attribute-based signature (ABS) scheme in which the correspondence between signers and signatures is captured in an arithmetic model of ...
This paper addresses the open problem of designing attribute-based signature (ABS) schemes with constant number of bilinear pairing operations for signature verification or short signatures for more general policies posed by Gagné et al. in Pairing 2012. Designing constant-size ABS for expressive acce...
Attribute-based signatures B. Waters Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization Y. Rouselakis, B. Waters, New constructions and proof methods for large universe attribute-based encryption, IACR... A. Kaletsch, A. Sunyaev, Privacy engineeri...
We introduce a new and versatile cryptographic primitive called Attribute-Based Signatures (ABS), in which a signature attests not to the identity of the individual who endorsed a message, but instead to a (possibly complex) claim regard... HK Maji,M Prabhakaran,M Rosulek - 《Iacr Cryptology...
The model enhances identity protection while enabling secure authentication without exposing sensitive information by incorporating privacy-preserving Attribute-Based Credentials and Attribute-Based Signatures. Our experimental evaluation demonstrates 86% authentication accuracy, 88% precision and 96% recall, ...
reveal the signers identity. A traceable scheme is such that a group of colluding members cannot forge a signature that will not be traced to at least one of them. Since Group Signatures was introduced, different security notions were defined; ...
Abstract. In real life, one requires signatures to be from people who ful- fill certain criteria, implying that they should possess specific attributes. For example, Alice might want a signature from an employee in Bobs company who is a member in the IT staff, a senior manager within the ...