LatticesNIZKsABESISWe construct a lattice-based (key-policy) attribute-based signatures (ABS) scheme which supports attributes of unbounded polynomial length (the size of the public parameters is a fixed polynomial in the security parameter and a depth bound, with which one can generate signatures ...
attribute-basedsignatures:基于属性的签名
Why attribute-based signatures? The kind of authentication required in an attribute-based system differs from that offered by digital signatures, in much the same way public-key encryption does not fit the bill for attribute- based encryption. An attribute-based solution requires a richer ...
Controllable LinkabilityWe introduce Attribute-Based Signatures with Controllable Linkability ABS-CL. In general, Attribute-Based Signatures allow a signer who possesses enough attributes to satisfy a predicate to sign a mesdoi:10.1007/978-3-319-31550-8_8Miguel Urquidi...
Attribute-based signatures B. Waters Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization Y. Rouselakis, B. Waters, New constructions and proof methods for large universe attribute-based encryption, IACR... A. Kaletsch, A. Sunyaev, Privacy engineeri...
This paper addresses the open problem of designing attribute-based signature (ABS) schemes with constant number of bilinear pairing operations for signature verification or short signatures for more general policies posed by Gagné et al. in Pairing 2012. Designing constant-size ABS for expressive acce...
We introduce a new and versatile cryptographic primitive called Attribute-Based Signatures (ABS), in which a signature attests not to the identity of the individual who endorsed a message, but instead to a (possibly complex) claim regard... HK Maji,M Prabhakaran,M Rosulek - 《Iacr Cryptology...
The model enhances identity protection while enabling secure authentication without exposing sensitive information by incorporating privacy-preserving Attribute-Based Credentials and Attribute-Based Signatures. Our experimental evaluation demonstrates 86% authentication accuracy, 88% precision and 96% recall, ...
reveal the signers identity. A traceable scheme is such that a group of colluding members cannot forge a signature that will not be traced to at least one of them. Since Group Signatures was introduced, different security notions were defined; ...
Abstract. In real life, one requires signatures to be from people who ful- fill certain criteria, implying that they should possess specific attributes. For example, Alice might want a signature from an employee in Bobs company who is a member in the IT staff, a senior manager within the ...