Shahandashti et al., 2009 - Google Patents
Threshold attribute-based signatures and their application to anonymous credential systemsShahandashti et al., 2009
View PDF- Document ID
- 3231202247972710282
- Author
- Shahandashti S
- Safavi-Naini R
- Publication year
- Publication venue
- International conference on cryptology in Africa
External Links
Snippet
In this paper we propose threshold attribute-based signatures (t-ABS). A t-ABS scheme enables a signature holder to prove possession of signatures by revealing only the relevant attributes of the signer, hence providing signer-attribute privacy for the signature holder. We …
- 230000005477 standard model 0 abstract description 6
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Shahandashti et al. | Threshold attribute-based signatures and their application to anonymous credential systems | |
Escala et al. | Revocable attribute-based signatures with adaptive security in the standard model | |
Goyal | Reducing trust in the PKG in identity based cryptosystems | |
Brickell et al. | Direct anonymous attestation | |
Camenisch et al. | An efficient system for non-transferable anonymous credentials with optional anonymity revocation | |
Ateniese et al. | Efficient group signatures without trapdoors | |
Blazy et al. | Round-optimal privacy-preserving protocols with smooth projective hash functions | |
Au et al. | Constant-size dynamic k-times anonymous authentication | |
Rass et al. | Cryptography for security and privacy in cloud computing | |
Fuchsbauer et al. | Anonymous proxy signatures | |
Camenisch et al. | Solving revocation with efficient update of anonymous credentials | |
Xu et al. | Accountable ring signatures: A smart card approach | |
Canard et al. | New results for the practical use of range proofs | |
Derler et al. | Short double-and n-times-authentication-preventing signatures from ECDSA and more | |
Wang | A provable secure fuzzy identity based signature scheme | |
Kiayias et al. | Concurrent blind signatures without random oracles | |
Zhang et al. | 1-round distributed key generation with efficient reconstruction using decentralized CP-ABE | |
Liu et al. | Secure deterministic wallet and stealth address: Key-insulated and privacy-preserving signature scheme with publicly derived public key | |
Bicer et al. | Versatile ABS: Usage limited, revocable, threshold traceable, authority hiding, decentralized attribute based signatures | |
Das et al. | Efficient post-quantum secure deterministic threshold wallets from isogenies | |
Hirt | Receipt-free K-out-of-L voting based on ElGamal encryption | |
Wei | Tracing-by-linking group signatures | |
Tian et al. | A short non-delegatable strong designated verifier signature | |
Liu et al. | Ring signature with designated linkability | |
Bultel et al. | Improving the efficiency of report and trace ring signatures |