Results 21 to 30 of about 241,807 (271)
Privacy-Preserving Electronic Ticket Scheme with Attribute-based Credentials [PDF]
Electronic tickets (e-tickets) are electronic versions of paper tickets, which enable users to access intended services and improve services' efficiency. However, privacy may be a concern of e-ticket users.
Chen, Liqun +4 more
core +2 more sources
Observation and abstract behaviour in specification and implementation of state-based systems [PDF]
Classical algebraic specification is an accepted framework for specification. A criticism which applies is the fact that it is functional, not based on a notion of state as most software development and implementation languages are.
Pahl, Claus
core +2 more sources
Hierarchical Attribute-Based Signatures
Attribute-based Signatures (ABS) are a powerful tool allowing users with attributes issued by authorities to sign messages while also proving that their attributes satisfy some policy. ABS schemes provide a flexible and privacy-preserving approach to authentication since the signer’s identity and attributes remain hidden within the anonymity set of ...
Dragan, Catalin +2 more
openaire +3 more sources
Aiming at the lack of effective forwarding verification mechanism for packet in software defined network (SDN), a data packet forwarding verification scheme based on attributed-based signatures identification was proposed.First, the attribute signature ...
Chaowen CHANG +3 more
doaj +2 more sources
I2PA : An Efficient ABC for IoT [PDF]
Internet of Things (IoT) is very attractive because of its promises. However, it brings many challenges, mainly issues about privacy preserving and lightweight cryptography.
Ciss, Abdoul Aziz +2 more
core +4 more sources
Decentralized Traceable Attribute-Based Signatures [PDF]
We provide a formal security model for traceable attribute-based signatures. Our focus is on the more practical case where attribute management is distributed among different authorities rather than relying on a single central authority. By specializing our model to the single attribute authority setting, we overcome some of the shortcomings of the ...
Ghadafi, Essam M O +2 more
openaire +3 more sources
One Attribute-Based Proxy Signature [PDF]
For Identity-based proxy signature, when the original signer cannot sign for some reason,he delegate his signing capabilities to a person with an identity, in order to expand the scope of the proxy signer, an entity with a series of attribute properties can perform the right of signature.
Haiping Si +3 more
openaire +1 more source
Anonymous Data Sharing and Access Control Based on Blockchain and Attribute-Based Cryptography [PDF]
Information security and privacy protection are critical requirements in the era of big data. Identity-based cryptography is a type of public-key cryptography that solves the main management problem of the traditional public key infrastructure.However ...
Jingyi WANG, Baixiang LIU, Ning FANG, Lingqi PENG
doaj +1 more source
Data Minimisation in Communication Protocols: A Formal Analysis Framework and Application to Identity Management [PDF]
With the growing amount of personal information exchanged over the Internet, privacy is becoming more and more a concern for users. One of the key principles in protecting privacy is data minimisation. This principle requires that only the minimum amount
de Weger, Benne +2 more
core +1 more source
Towards Practical Attribute-Based Signatures
An attribute-based signature ABS is a special digital signature created using a dynamic set of issued attributes. For instance, a doctor can sign a medical statement with his name, medical license number and medical speciality. These attributes can be verified along with the signature by any verifier with the correct public keys of the respective ...
Hampiholi, B. +3 more
openaire +2 more sources

