[go: up one dir, main page]

Papagiannopoulos et al., 2013 - Google Patents

Designated attribute proofs with the Camenish–Lysyanskaya signature

Papagiannopoulos et al., 2013

View PDF
Document ID
16030063594788325482
Author
Papagiannopoulos K
Alpár G
Lueks W
Publication year
Publication venue
Proceedings of the 34rd WIC Symposium on Information Theory in the Benelux, Leuven, Belgium. May 30—31

External Links

Snippet

An attribute-based credential (ABC), an authentic personal electronic piece of information to perform transactions, offers a secure and privacy-preserving method to authorize user transactions. One of the most important techniques to realize ABCs is the Camenisch …
Continue reading at www.academia.edu (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Sonnino et al. Coconut: Threshold issuance selective disclosure credentials with applications to distributed ledgers
Dinarvand et al. An efficient and secure RFID authentication protocol using elliptic curve cryptography
Rao et al. Efficient attribute-based signature and signcryption realizing expressive access structures
EP3091690A1 (en) Rsa decryption using multiplicative secret sharing
Singh et al. A novel credential protocol for protecting personal attributes in blockchain
US20140177830A1 (en) Method and system for providing a public key/secret key pair for encrypting and decrypting data
Li et al. HealthFort: A cloud-based ehealth system with conditional forward transparency and secure provenance via blockchain
Shankar et al. Improved multisignature scheme for authenticity of digital document in digital forensics using edward‐curve digital signature algorithm
Tsai et al. An ECC‐based blind signcryption scheme for multiple digital documents
Tian et al. Secure limitation analysis of public-key cryptography for smart card settings
Pu et al. Post quantum fuzzy stealth signatures and applications
Feng et al. White-box implementation of Shamir’s identity-based signature scheme
Singh et al. Public integrity auditing for shared dynamic cloud data
Kumar et al. Analysis and design of protocol for enhanced threshold proxy signature scheme based on RSA for known signers
Sahu et al. Identity‐based multi‐proxy multi‐signature scheme provably secure in random oracle model
Kumar et al. Cryptanalysis and performance evaluation of enhanced threshold proxy signature scheme based on RSA for known signers
Zhang et al. Privacy Protection During the Issuance and Revocation of Verifiable Credentials in Self‐Sovereign Identity
Shin et al. AAnA: Anonymous authentication and authorization based on short traceable signatures
Pedrosa et al. Holder-of-key threshold access token for anonymous data resources
Papagiannopoulos et al. Designated attribute proofs with the Camenish–Lysyanskaya signature
Park et al. Security weakness of a certificate-based proxy signature scheme for IIoT environments
Alpár et al. Designated Attribute Proofs with the Camenish-Lysyanskaya Signature
Téllez et al. Security in mobile payment systems
Zhang et al. Single-sign-on authentication with anonymous token and restricted covert channel
Singh et al. Cloud assisted semi-static secure accountable authority identity-based broadcast encryption featuring public traceability without random oracles