Results 11 to 20 of about 241,807 (271)

Generic Construction of Decentralized Attribute-Based Σ-Protocol and Its Applications

open access: yesJisuanji kexue yu tansuo, 2021
Attribute-based cryptography becomes one of the hot topics in cryptography, since it can provide fine-grained access control and good privacy.
YANG Xiaoli, HUANG Zhenjie
doaj   +1 more source

SPCABS: Signature-Policy Comparable Attribute-Based Signatures

open access: yesSecurity and Communication Networks, 2022
Attribute-based signature is an attractive cryptographic primitive and finds broad applications in many fields. Existing attribute-based signature schemes deal with attributes in the way of “with” or “without,” and there is no attribute-based signature scheme that supports comparing attributes.
Hongying Chen   +3 more
openaire   +1 more source

White-box Traceable Attribute Signature Scheme [PDF]

open access: yesJisuanji gongcheng, 2017
Attribute-based Signature(ABS) protocol has the property of anonymity,and its private keys are not band to identities.Malicious users might make use of this to leak their private keys for financial benefits.Therefore,this paper proposes a traceable ...
LIU Yuyang,ZHAO Yiming
doaj   +1 more source

Attribute-Based Signatures [PDF]

open access: yes, 2011
We introduce Attribute-Based Signatures (ABS), a versatile primitive that allows a party to sign a message with fine-grained control over identifying information. In ABS, a signer, who possesses a set of attributes from the authority, can sign a message with a predicate that is satisfied by his attributes.
Hemanta K. Maji   +2 more
openaire   +1 more source

Anonymous trust management scheme of VANET based on attribute signature

open access: yes网络与信息安全学报, 2023
Trust management mechanisms can solve the authenticity assessment problem of messages and establish trust between communication entities in the VANET.However, current trust management schemes lack an effective privacy protection mechanism, leading to ...
Min XIAO, Faying MAO, Yonghong HUANG, Yunfei CAO
doaj   +3 more sources

PAbAC : a privacy preserving attribute based framework for fine grained access control in clouds [PDF]

open access: yes, 2016
Several existing access control solutions mainly focus on preserving confidentiality of stored data from unauthorized access and the storage provider.
Attia, R   +4 more
core   +3 more sources

Blockchain Supervisable Privacy Protection Scheme Based on Group Signature and Attribute Encryption [PDF]

open access: yesJisuanji gongcheng, 2022
The decentralization of blockchain technology and difficulty of data tampering provide it with obvious advantages in traceability.Traceability systems based on blockchain can solve information island, low sharing degree, and data tampering problems in ...
LI Li, DU Huina, LI Tao
doaj   +1 more source

Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information [PDF]

open access: yes, 2015
Search engines are the prevalently used tools to collect information about individuals on the Internet. Search results typically comprise a variety of sources that contain personal information -- either intentionally released by the person herself, or ...
C Olston   +6 more
core   +3 more sources

Decentralized Attribute-Based Signatures [PDF]

open access: yes, 2013
We present the first decentralized multi-authority attribute-based signature (DMA-ABS) scheme, in which no central authority and no trusted setup are required. The proposed DMA-ABS scheme for a large class of (non-monotone) predicates is fully secure (adaptive-predicate unforgeable and perfectly private) under a standard assumption, the decisional ...
Tatsuaki Okamoto, Katsuyuki Takashima
openaire   +1 more source

Secure Outsourced Attribute-Based Signatures [PDF]

open access: yesIEEE Transactions on Parallel and Distributed Systems, 2014
Attribute-based signature (ABS) enables users to sign messages over attributes without revealing any information other than the fact that they have attested to the messages. However, heavy computational cost is required during signing in existing work of ABS, which grows linearly with the size of the predicate formula.
Chen, Xiaofeng   +5 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy