Results 11 to 20 of about 241,807 (271)
Generic Construction of Decentralized Attribute-Based Σ-Protocol and Its Applications
Attribute-based cryptography becomes one of the hot topics in cryptography, since it can provide fine-grained access control and good privacy.
YANG Xiaoli, HUANG Zhenjie
doaj +1 more source
SPCABS: Signature-Policy Comparable Attribute-Based Signatures
Attribute-based signature is an attractive cryptographic primitive and finds broad applications in many fields. Existing attribute-based signature schemes deal with attributes in the way of “with” or “without,” and there is no attribute-based signature scheme that supports comparing attributes.
Hongying Chen +3 more
openaire +1 more source
White-box Traceable Attribute Signature Scheme [PDF]
Attribute-based Signature(ABS) protocol has the property of anonymity,and its private keys are not band to identities.Malicious users might make use of this to leak their private keys for financial benefits.Therefore,this paper proposes a traceable ...
LIU Yuyang,ZHAO Yiming
doaj +1 more source
Attribute-Based Signatures [PDF]
We introduce Attribute-Based Signatures (ABS), a versatile primitive that allows a party to sign a message with fine-grained control over identifying information. In ABS, a signer, who possesses a set of attributes from the authority, can sign a message with a predicate that is satisfied by his attributes.
Hemanta K. Maji +2 more
openaire +1 more source
Anonymous trust management scheme of VANET based on attribute signature
Trust management mechanisms can solve the authenticity assessment problem of messages and establish trust between communication entities in the VANET.However, current trust management schemes lack an effective privacy protection mechanism, leading to ...
Min XIAO, Faying MAO, Yonghong HUANG, Yunfei CAO
doaj +3 more sources
PAbAC : a privacy preserving attribute based framework for fine grained access control in clouds [PDF]
Several existing access control solutions mainly focus on preserving confidentiality of stored data from unauthorized access and the storage provider.
Attia, R +4 more
core +3 more sources
Blockchain Supervisable Privacy Protection Scheme Based on Group Signature and Attribute Encryption [PDF]
The decentralization of blockchain technology and difficulty of data tampering provide it with obvious advantages in traceability.Traceability systems based on blockchain can solve information island, low sharing degree, and data tampering problems in ...
LI Li, DU Huina, LI Tao
doaj +1 more source
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information [PDF]
Search engines are the prevalently used tools to collect information about individuals on the Internet. Search results typically comprise a variety of sources that contain personal information -- either intentionally released by the person herself, or ...
C Olston +6 more
core +3 more sources
Decentralized Attribute-Based Signatures [PDF]
We present the first decentralized multi-authority attribute-based signature (DMA-ABS) scheme, in which no central authority and no trusted setup are required. The proposed DMA-ABS scheme for a large class of (non-monotone) predicates is fully secure (adaptive-predicate unforgeable and perfectly private) under a standard assumption, the decisional ...
Tatsuaki Okamoto, Katsuyuki Takashima
openaire +1 more source
Secure Outsourced Attribute-Based Signatures [PDF]
Attribute-based signature (ABS) enables users to sign messages over attributes without revealing any information other than the fact that they have attested to the messages. However, heavy computational cost is required during signing in existing work of ABS, which grows linearly with the size of the predicate formula.
Chen, Xiaofeng +5 more
openaire +2 more sources

