Results 1 to 10 of about 241,708 (172)

Attribute-Based Blind Signature Scheme Based on Elliptic Curve Cryptography

open access: yesIEEE Access, 2022
Blind signature is a special digital signature that allows the signer to sign a document without knowing its content. However, in many situations, multiple people need to blindly sign messages.
Rui Ma, Linyue Du
exaly   +3 more sources

Revocable Attribute-Based Signature for Blockchain-Based Healthcare System

open access: yesIEEE Access, 2020
Blockchain-Based Healthcare System (HS-BC) is an electronic medical record (EMR) data-sharing system, which significantly facilitates the storage, access, and sharing of EMR data, and provides patients with timely and effective medical diagnosis and ...
Qianqian Su, Rui Zhang, Rui Xue
exaly   +3 more sources

Efficient Pairing-Free Attribute-Based Blind Signature Scheme Based on Ordered Binary Decision Diagram

open access: yesIEEE Access, 2022
Attribute-based blind signature is used to realize the blind signature of messages by multiple people, and it is suitable for electronic payment services in the cloud.
Rui Ma, Linyue Du
exaly   +3 more sources

Expressive Attribute-Based Proxy Signature Scheme for UAV Networks [PDF]

open access: yesSensors
Unmanned aerial vehicle (UAV) networks have become an essential component of modern civilian and military infrastructures. However, the communication channels between UAVs and their control entities remain vulnerable to spoofing and message tampering ...
Lei He, Yong Gan, Songhe Jin
doaj   +2 more sources

Attribute-Based Parallel Key-Insulated Signature [PDF]

open access: yesCybernetics and Information Technologies, 2015
To deal with the key-exposure protection problem in attribute-based signature systems, we extend the parallel key-insulated mechanism to attribute-based signature scenarios, and then introduce the primitive of an Attribute-Based Parallel Key-Insulated ...
Chen Jianhong   +3 more
doaj   +2 more sources

A multi-authority attribute ring signature supporting dynamic policies and dual anonymity for zero-trust networks [PDF]

open access: yesScientific Reports
The advent of Decentralized Identity (DID) technology is fundamentally changing the way digital identity is managed, allowing user-controlled, privacy-preserving authentication across trust domains a fundamental requirement if zero trust architectures ...
Jinhong Chen   +4 more
doaj   +2 more sources

Attribute based sanitizable signature scheme

open access: yesTongxin xuebao, 2013
Sensitive information in the document needs to be hidden in cloud computing environment, and attribute based sanitizable signature (ABSS) scheme was proposed to solve this problem. The ABSS scheme brings the character of sanitiz-able into ABS in order to
Xi-meng LIU   +4 more
doaj   +3 more sources

A study on the traceable attribute-based signature scheme provided with anonymous credentials

open access: yesConnection Science
In order to provide the reliability of transmitted data in the era of big data, it is necessary to communicate by applying signature technology to data. There are various signature schemes, among which attribute-based signatures perform signatures based ...
Yong Woon Hwang   +3 more
exaly   +3 more sources

Attribute-Based Signature with Message Recovery

open access: yesLecture Notes in Computer Science, 2014
We present a new notion called the attribute-based signature with message recovery. Compared with the existing attribute-based signature schemes, an attribute-based signature with message recovery scheme does not require transmission of the original message to verify the validity of the signature, since the original message can be recovered from the ...
Willy Susilo
exaly   +4 more sources

A Delegation Attack Method on Attribute-Based Signatures and Probable Solutions

open access: yesMathematics, 2022
Attribute-based signature (ABS) assures the verifier that the message is endorsed by a signer whose attributes satisfy the claimed attribute policy (predicate); thus, it can provide identity authentication with privacy preservation in scenarios like ...
Jialu Hao   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy