[go: up one dir, main page]

Sakai et al., 2018 - Google Patents

Attribute-based signatures for unbounded languages from standard assumptions

Sakai et al., 2018

View PDF
Document ID
18101943289435207745
Author
Sakai Y
Katsumata S
Attrapadung N
Hanaoka G
Publication year
Publication venue
International Conference on the Theory and Application of Cryptology and Information Security

External Links

Snippet

Attribute-based signature (ABS) schemes are advanced signature schemes that simultaneously provide fine-grained authentication while protecting privacy of the signer. Previously known expressive ABS schemes support either the class of deterministic finite …
Continue reading at eprint.iacr.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Similar Documents

Publication Publication Date Title
Sakai et al. Attribute-based signatures for unbounded languages from standard assumptions
Poelstra et al. Confidential assets
Maurer Modelling a public-key infrastructure
Dieye et al. A self-sovereign identity based on zero-knowledge proof and blockchain
El Kaafarani et al. Attribute-based signatures for unbounded circuits in the ROM and efficient instantiations from lattices
Bootle et al. A framework for practical anonymous credentials from lattices
Karvelas et al. Efficient proofs of secure erasure
Ganesh et al. What makes fiat–shamir zksnarks (updatable srs) simulation extractable?
Bosk et al. Hidden issuer anonymous credential
Kim et al. Simulation-extractable zk-SNARK with a single verification
Chatterjee et al. Type 2 structure-preserving signature schemes revisited
Perera et al. Fully dynamic group signature scheme with member registration and verifier-local revocation
Komargodski et al. Another step towards realizing random oracles: non-malleable point obfuscation
Chen et al. Proof-carrying data from arithmetized random oracles
Nassar et al. Monotone policy BARGs from BARGs and additively homomorphic encryption
Couteau et al. Non-interactive keyed-verification anonymous credentials
Hall-Andersen et al. On Valiant’s conjecture: impossibility of incrementally verifiable computation from random oracles
Champion et al. Non-interactive zero-knowledge from non-interactive batch arguments
Baldimtsi et al. Oblivious accumulators
Nguyen et al. Bicameral and auditably private signatures
Nassar et al. Monotone-policy BARGs and more from BARGs and quadratic residuosity
Shmueli et al. On One-Shot Signatures, Quantum vs Classical Binding, and Obfuscating Permutations
Bhattacharyya Memory-tight reductions for practical key encapsulation mechanisms
Fang et al. Blockchain‐based privacy‐preserving valet parking for self‐driving vehicles
Huth Secure communicating systems: design, analysis, and implementation