Bakshi et al., 2020 - Google Patents
Privacy enhanced attribute based eSignBakshi et al., 2020
View PDF- Document ID
- 14021431748144889033
- Author
- Bakshi P
- Nandi S
- Publication year
- Publication venue
- CS & IT Conference Proceedings
External Links
Snippet
In recent years, Government of India has introduced many Aadhaar based online services. Although these initiatives helped India compete in digital revolution across world and were acclaimed by many, they have also raised some concerns about security especially the …
- 238000000034 method 0 description 21
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Liu et al. | Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model | |
| Benabbas et al. | Verifiable delegation of computation over large datasets | |
| US7533270B2 (en) | Signature schemes using bilinear mappings | |
| Liu et al. | A separable threshold ring signature scheme | |
| Yuen et al. | How to construct identity-based signatures without the key escrow problem | |
| Tsang et al. | A suite of non-pairing id-based threshold ring signature schemes with different levels of anonymity | |
| Pang et al. | Efficient and secure certificateless signature scheme in the standard model | |
| Yuan et al. | Certificateless threshold signature scheme from bilinear maps | |
| Yoon | An efficient and secure identity-based strong designated verifier signature scheme | |
| Liu et al. | Identity-based remote data integrity checking of cloud storage from lattices | |
| Zhou et al. | Certificate-based generalized ring signcryption scheme | |
| Li et al. | Provably Secure Certificate-based Proxy Signature Schemes. | |
| Zheng et al. | Threshold attribute‐based signcryption and its application to authenticated key agreement | |
| Yang | Certificateless universal designated verifier signature schemes | |
| Liu et al. | Identity-based threshold proxy signature from bilinear pairings | |
| Tian et al. | A systematic method to design strong designated verifier signature without random oracles | |
| Tsai et al. | Leakage-resilient certificateless signcryption scheme under a continual leakage model | |
| Zhang et al. | Privacy‐friendly weighted‐reputation aggregation protocols against malicious adversaries in cloud services | |
| Bakshi et al. | Privacy enhanced attribute based eSign | |
| Hwang et al. | New efficient batch verification for an identity‐based signature scheme | |
| Rasslan et al. | An IoT Privacy-Oriented selective disclosure credential system | |
| Tsai et al. | A Secure Group Signature Scheme. | |
| Dehkordi et al. | Certificateless identification protocols from super singular elliptic curve | |
| Tornos et al. | Optimizing ring signature keys for e-voting | |
| Das | Key-escrow free multi-signature scheme using bilinear pairings |