Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
AFRICACRYPT '09 Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology
Hidden attribute-based signatures without anonymity revocation
Information Sciences: an International Journal
Attribute-based signature and its applications
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Threshold attribute-based signcryption
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
Biometric identity based signature revisited
EuroPKI'09 Proceedings of the 6th European conference on Public key infrastructures, services and applications
CT-RSA'11 Proceedings of the 11th international conference on Topics in cryptology: CT-RSA 2011
Efficient attribute-based signatures for non-monotone predicates in the standard model
PKC'11 Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography
Attribute based signatures for bounded multi-level threshold circuits
EuroPKI'10 Proceedings of the 7th European conference on Public key infrastructures, services and applications
An efficient attribute-based signature scheme with claim-predicate mechanism
International Journal of Grid and Utility Computing
Future Generation Computer Systems
Flexible multi-authority attribute-based signature schemes for expressive policy
Mobile Information Systems - Advances in Network-Based Information Systems
Hi-index | 0.00 |
In real life, one requires signatures from people who satisfy certain criteria like that they should possess some specific attributes. For example, Alice wants a document to be signed by some employee in Bob’s company. This employee must have certain attributes such as being part of the IT staff and at least a junior manager in the cryptography team or a senior manager in the biometrics team. In order to satisfy these kinds of needs, we defined a common Attribute-based signature scheme where the signing member has to have certain attributes or belong to a certain group, and we also proved our scheme to be secure.