Forward secure attribute-based signatures.. Yuen T H,Liu J K,Huang X, et al. Information and Communications Security . 2012T. H. Yuen, J. K. Liu, X. Huang, M. H. Au, W. Susilo, and J. Zhou. Forward secure attribute-based signatures. In Information and Communications Security - ...
An efficient public-key attribute-based broadcast encryption scheme allowing arbitrary access policies We describe a new public-key and provably secure attribute-based broadcast encryption scheme which supports com-plex access policies with AND, OR and NOT g... P Junod,A Karlov 被引量: 69发表: ...
Forward secure attribute-based signatures.. Yuen T H,Liu J K,Huang X, et al. Information and Communications Security . 2012T. H. Yuen, J. K. Liu, X. Huang, M. H. Au, W. Susilo, and J. Zhou. Forward secure attribute-based signatures. In Information and Communications Security - ...
forward-securekeyexposurethresholdIn an attribute-based signature (ABS) scheme, each signer is issued a private key according to his/her attributes, and can sign a message with respect to some signing predicate satisfied by his/her attributes. A recipient of the signature can verify that the ...
Most of the existing forward-secure group signatures (FS-GS) are built from number-theoretic security assumptions which are vulnerable to quantum computers. The only post-quantum secure FS-GS scheme is built from lattices by Ling et al. (PQCrypto 19) in the random oracle model, following the...
In forward secure cryptographic schemes, even if a secret key is exposed, messages encrypted during all time periods prior to the key leak remain secret. In this paper we propose an efficient Forward Secure Ciphertext-Policy Attribute-Based Encryption (FS-CP-ABE) which is efficient and fully ...
Waters, "Dynamic credentials and ciphertext delegation for attribute-based encryption," in Advances in Cryptology-CRYPTO 2012. Springer, 2012, pp. 199-217.X.Boyen,H.Shacham,E.Shen,B.Waters.Forward-Secure Signatures with Untrusted Update. ACM Computer and Communications Security CCS‘06 . 2006...
In forward secure cryptographic schemes, even if a secret key is exposed, messages encrypted during all time periods prior to the key leak remain secret. In this paper we propose an efficient Forward Secure Ciphertext-Policy Attribute-Based Encryption (FS-CP-ABE) which is efficient and fully ...
Cloud Access control scheme proposes a new notion called Forward secure event oriented attribute-based anonymous access control, which is a cryptographic approach particularly designed for supporting cloud computing environment. In this new notion, a user can authenticate to the cloud computing server ...
In forward secure cryptographic schemes, even if a secret key is exposed, messages encrypted during all time periods prior to the key leak remain secret. In this paper we propose an efficient Forward Secure Ciphertext-Policy Attribute-Based Encryption (FS-CP-ABE) which is efficient and fully ...