In this paper a new signature scheme, called Policy-Endorsing Attribute-Based Signature, is developed to correspond with the existing Ciphertext-Policy Attribute-Based Encryption This signature provides a policy-and-endorsement mechanism In this mechanism a single user, whose attributes satisfy the predicate, endorses the message This signature allows the signer to announce his endorsement using an access policy without having to reveal the identity of the signer The security of this signature, selfless anonymity and existential unforgeability, is based on the Strong Diffie-Hellman assumption and the Decision Linear assumption in bilinear map groupshttp://gateway.webofknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=...
Attribute-Based Signatures (ABS) are a versatile cryptographic primitive and have many applications....
Attribute-based Signatures (ABS) are a powerful tool allowing users with attributes issued by autho...
In Ciphertext Policy Attribute based Encryption scheme, the encryptor can fix the policy, who can de...
International audienceAn Attribute-based signature (ABS), is a cryptographic scheme where someone ca...
Recently, Wang et al. presented a new construction of attribute-based signature with policy-and-endo...
We provide a formal security model for traceable attribute-based signatures. Our focus is on the mor...
We introduce Attribute-Based Signatures (ABS), a versatile primitive that allows a party to sign a m...
Abstract. Attribute-based signatures allow a signer owning a set of attributes to anonymously sign a...
International audienceAttribute-based cryptography is a natural solution for fine-grained access con...
We introduce Attribute-Based Signatures with Controllable Linkability ABS-CL. In general, Attribute-...
A major limitation of attribute-based cryptographic primitives is that a curious attribute authority...
An Attribute-Based Signcryption (ABSC) is a natural extension of Attribute-Based Encryption (ABE) an...
In this paper, we introduce Attribute-Based Signatures with User-Controlled Linkability (ABS-UCL). A...
I1n Ciphertext Policy Attribute based Encryption scheme, the encryptor can fix the policy, who can d...
Comunicació presentada a: RSA Conference, celebrada del 27 de febrer al 2 de març de 2012 a San Fran...
Attribute-Based Signatures (ABS) are a versatile cryptographic primitive and have many applications....
Attribute-based Signatures (ABS) are a powerful tool allowing users with attributes issued by autho...
In Ciphertext Policy Attribute based Encryption scheme, the encryptor can fix the policy, who can de...
International audienceAn Attribute-based signature (ABS), is a cryptographic scheme where someone ca...
Recently, Wang et al. presented a new construction of attribute-based signature with policy-and-endo...
We provide a formal security model for traceable attribute-based signatures. Our focus is on the mor...
We introduce Attribute-Based Signatures (ABS), a versatile primitive that allows a party to sign a m...
Abstract. Attribute-based signatures allow a signer owning a set of attributes to anonymously sign a...
International audienceAttribute-based cryptography is a natural solution for fine-grained access con...
We introduce Attribute-Based Signatures with Controllable Linkability ABS-CL. In general, Attribute-...
A major limitation of attribute-based cryptographic primitives is that a curious attribute authority...
An Attribute-Based Signcryption (ABSC) is a natural extension of Attribute-Based Encryption (ABE) an...
In this paper, we introduce Attribute-Based Signatures with User-Controlled Linkability (ABS-UCL). A...
I1n Ciphertext Policy Attribute based Encryption scheme, the encryptor can fix the policy, who can d...
Comunicació presentada a: RSA Conference, celebrada del 27 de febrer al 2 de març de 2012 a San Fran...
Attribute-Based Signatures (ABS) are a versatile cryptographic primitive and have many applications....
Attribute-based Signatures (ABS) are a powerful tool allowing users with attributes issued by autho...
In Ciphertext Policy Attribute based Encryption scheme, the encryptor can fix the policy, who can de...