Sakai et al., 2018 - Google Patents
Attribute-based signatures for unbounded languages from standard assumptionsSakai et al., 2018
View PDF- Document ID
- 18101943289435207745
- Author
- Sakai Y
- Katsumata S
- Attrapadung N
- Hanaoka G
- Publication year
- Publication venue
- International Conference on the Theory and Application of Cryptology and Information Security
External Links
Snippet
Attribute-based signature (ABS) schemes are advanced signature schemes that simultaneously provide fine-grained authentication while protecting privacy of the signer. Previously known expressive ABS schemes support either the class of deterministic finite …
- 238000005094 computer simulation 0 abstract description 8
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Sakai et al. | Attribute-based signatures for unbounded languages from standard assumptions | |
| Poelstra et al. | Confidential assets | |
| Maurer | Modelling a public-key infrastructure | |
| Dieye et al. | A self-sovereign identity based on zero-knowledge proof and blockchain | |
| El Kaafarani et al. | Attribute-based signatures for unbounded circuits in the ROM and efficient instantiations from lattices | |
| Bootle et al. | A framework for practical anonymous credentials from lattices | |
| Karvelas et al. | Efficient proofs of secure erasure | |
| Ganesh et al. | What makes fiat–shamir zksnarks (updatable srs) simulation extractable? | |
| Bosk et al. | Hidden issuer anonymous credential | |
| Kim et al. | Simulation-extractable zk-SNARK with a single verification | |
| Chatterjee et al. | Type 2 structure-preserving signature schemes revisited | |
| Perera et al. | Fully dynamic group signature scheme with member registration and verifier-local revocation | |
| Komargodski et al. | Another step towards realizing random oracles: non-malleable point obfuscation | |
| Chen et al. | Proof-carrying data from arithmetized random oracles | |
| Nassar et al. | Monotone policy BARGs from BARGs and additively homomorphic encryption | |
| Couteau et al. | Non-interactive keyed-verification anonymous credentials | |
| Hall-Andersen et al. | On Valiant’s conjecture: impossibility of incrementally verifiable computation from random oracles | |
| Champion et al. | Non-interactive zero-knowledge from non-interactive batch arguments | |
| Baldimtsi et al. | Oblivious accumulators | |
| Nguyen et al. | Bicameral and auditably private signatures | |
| Nassar et al. | Monotone-policy BARGs and more from BARGs and quadratic residuosity | |
| Shmueli et al. | On One-Shot Signatures, Quantum vs Classical Binding, and Obfuscating Permutations | |
| Bhattacharyya | Memory-tight reductions for practical key encapsulation mechanisms | |
| Fang et al. | Blockchain‐based privacy‐preserving valet parking for self‐driving vehicles | |
| Huth | Secure communicating systems: design, analysis, and implementation |