Papagiannopoulos et al., 2013 - Google Patents
Designated attribute proofs with the Camenish–Lysyanskaya signaturePapagiannopoulos et al., 2013
View PDF- Document ID
- 16030063594788325482
- Author
- Papagiannopoulos K
- Alpár G
- Lueks W
- Publication year
- Publication venue
- Proceedings of the 34rd WIC Symposium on Information Theory in the Benelux, Leuven, Belgium. May 30—31
External Links
Snippet
An attribute-based credential (ABC), an authentic personal electronic piece of information to perform transactions, offers a secure and privacy-preserving method to authorize user transactions. One of the most important techniques to realize ABCs is the Camenisch …
- 238000000034 method 0 abstract description 8
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Sonnino et al. | Coconut: Threshold issuance selective disclosure credentials with applications to distributed ledgers | |
| Dinarvand et al. | An efficient and secure RFID authentication protocol using elliptic curve cryptography | |
| Rao et al. | Efficient attribute-based signature and signcryption realizing expressive access structures | |
| EP3091690A1 (en) | Rsa decryption using multiplicative secret sharing | |
| Singh et al. | A novel credential protocol for protecting personal attributes in blockchain | |
| US20140177830A1 (en) | Method and system for providing a public key/secret key pair for encrypting and decrypting data | |
| Li et al. | HealthFort: A cloud-based ehealth system with conditional forward transparency and secure provenance via blockchain | |
| Shankar et al. | Improved multisignature scheme for authenticity of digital document in digital forensics using edward‐curve digital signature algorithm | |
| Tsai et al. | An ECC‐based blind signcryption scheme for multiple digital documents | |
| Tian et al. | Secure limitation analysis of public-key cryptography for smart card settings | |
| Pu et al. | Post quantum fuzzy stealth signatures and applications | |
| Feng et al. | White-box implementation of Shamir’s identity-based signature scheme | |
| Singh et al. | Public integrity auditing for shared dynamic cloud data | |
| Kumar et al. | Analysis and design of protocol for enhanced threshold proxy signature scheme based on RSA for known signers | |
| Sahu et al. | Identity‐based multi‐proxy multi‐signature scheme provably secure in random oracle model | |
| Kumar et al. | Cryptanalysis and performance evaluation of enhanced threshold proxy signature scheme based on RSA for known signers | |
| Zhang et al. | Privacy Protection During the Issuance and Revocation of Verifiable Credentials in Self‐Sovereign Identity | |
| Shin et al. | AAnA: Anonymous authentication and authorization based on short traceable signatures | |
| Pedrosa et al. | Holder-of-key threshold access token for anonymous data resources | |
| Papagiannopoulos et al. | Designated attribute proofs with the Camenish–Lysyanskaya signature | |
| Park et al. | Security weakness of a certificate-based proxy signature scheme for IIoT environments | |
| Alpár et al. | Designated Attribute Proofs with the Camenish-Lysyanskaya Signature | |
| Téllez et al. | Security in mobile payment systems | |
| Zhang et al. | Single-sign-on authentication with anonymous token and restricted covert channel | |
| Singh et al. | Cloud assisted semi-static secure accountable authority identity-based broadcast encryption featuring public traceability without random oracles |