Traceable attribute-based signature (TABS) is a useful cryptographic tool to protect the real signers' identities while tracing the real signers under some conditions. Traceable attribute-based signature inherits the merits of attribute-based signature, where each signer can sign any messages with fine...
可追踪的基于属性的签名(Traceable attribute-based signature)是一种有效的密码学工具,在一些条件下可以在追踪真实签名者的同时保护真实签名者的身份。可追踪的基于属性的签名继承了基于属性签名的优点,每个签名者都可以对任何消息进行签名,并对身份信息进行细粒度访问控制(fine-grained access control)。 基于属性的签名(...
In an attribute-based signature (ABS) scheme, the signer’s identity keeps anonymous. To prevent the signer from abusing this property, Escala, Herranz, and Morillo proposed an identity traceable attribute-based signature scheme (EHM-ABS). Their scheme u
text policy attribute-based signcryption (sign-then-encrypt) scheme to simultaneously realize the notion of traitor-tracing, fine-grained access control, sender anonymity, message integrity, authenticity and sensitivity by extending traceable attribute based encryption scheme using attribute-based signature. ...
White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures In a ciphertext-policy attribute-based encryption (CP-ABE) system, decryption keys are defined over attributes shared by multiple users. Given a decryption... Z Liu,Z Cao,DS Wong - 《IEEE Tr...
attribute based signature scheme with untrusted authority and traceability (KP-ABS-UT). In our scheme, the signer’s private key is composed by two components: one part is distributed by attribute authority and the other part is chosen privately by the signer’s self. Thus attribute authority ...
We provide a formal security model for traceable attribute-based signatures. Our focus is on the more practical case where attribute management is distributed among different authorities rather than relying on a single central authority. By specializing our model to the single attribute authority setting...
Attribute-based encryption, especially ciphertext-policy attribute-based encryption, plays an important role in the data sharing. In the process of data sharing, the secret key does not contain the specific information of users, who may share his secret key with other users for benefits without ...
In particular, one attribute of copper-based cables which is deficient in fiber optic cables is the ability to wirelessly trace the physical locations and termination points of cables throughout a network; for example, along a cable tray or within wall and ceiling plenums. Traditional electrical ...
Attribute-based signature (ABS) allows signers with a set of attributes to sign messages anonymously using a specific signing policy. However, previous schemes suffer from some efficiency issues which are not widely applied on the blockchain. In this paper, we investigate ABS rega...