ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Attribute-based encryption for fine-grained access control of encrypted data
Proceedings of the 13th ACM conference on Computer and communications security
Ciphertext-Policy Attribute-Based Encryption
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
Attribute-based encryption with non-monotonic access structures
Proceedings of the 14th ACM conference on Computer and communications security
Attribute-based Signature Scheme
ISA '08 Proceedings of the 2008 International Conference on Information Security and Assurance (isa 2008)
EUROCRYPT '07 Proceedings of the 26th annual international conference on Advances in Cryptology
Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
Distributed Attribute-Based Encryption
Information Security and Cryptology --- ICISC 2008
Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
AFRICACRYPT '09 Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology
Privacy-Aware Attribute-Based Encryption with User Accountability
ISC '09 Proceedings of the 12th International Conference on Information Security
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
CRYPTO '09 Proceedings of the 29th Annual International Cryptology Conference on Advances in Cryptology
Improving privacy and security in multi-authority attribute-based encryption
Proceedings of the 16th ACM conference on Computer and communications security
An Efficient Attribute-Based Ring Signature Scheme
IFCSTA '09 Proceedings of the 2009 International Forum on Computer Science-Technology and Applications - Volume 01
Hidden attribute-based signatures without anonymity revocation
Information Sciences: an International Journal
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Attribute-based signature and its applications
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Multi-authority attribute based encryption
TCC'07 Proceedings of the 4th conference on Theory of cryptography
Mobile Information Systems - Mobile and Wireless Networks
Diffie-Hellman key based authentication in proxy mobile IPv6
Mobile Information Systems - Mobile and Wireless Networks
CT-RSA'11 Proceedings of the 11th international conference on Topics in cryptology: CT-RSA 2011
Efficient attribute-based signatures for non-monotone predicates in the standard model
PKC'11 Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography
Revocable attribute-based signatures with adaptive security in the standard model
AFRICACRYPT'11 Proceedings of the 4th international conference on Progress in cryptology in Africa
Attribute based signatures for bounded multi-level threshold circuits
EuroPKI'10 Proceedings of the 7th European conference on Public key infrastructures, services and applications
Enhancing Attribute-Based Encryption with Attribute Hierarchy
Mobile Networks and Applications
Authenticating with Attributes in Online Social Networks
NBIS '11 Proceedings of the 2011 14th International Conference on Network-Based Information Systems
Fuzzy identity-based encryption
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Mobile Information Systems - Emerging Wireless and Mobile Technologies
Enhancing MISP with Fast Mobile IPv6 Security
Mobile Information Systems - Emerging Wireless and Mobile Technologies
Advances in Network-based Information Systems
Mobile Information Systems - Advances in Network-Based Information Systems
Hi-index | 0.00 |
Attribute-based signature ABS is a new cryptographic primitive, in which a signer can sign a message with his attributes, and the verifier can only known whether the signer owns attributes satisfying his policy. Moreover, the signature cannot be forged by any user not having attributes satisfying the policy. ABS has many applications, such as anonymous authentication, and attribute-based messaging systems. But many applications may require a user obtaining attributes from different authorities, which calls for multi-authority ABS schemes. In this paper, we first propose a multi-authority ABS scheme, called TR_MABS, adopting an attribute tree to support expressive policy consisting of AND, OR, threshold gates. As TR_MABS brings in expensive cost on adding or removing attribute authorities, we present another multi-authority ABS scheme, named DNF_MABS, which uses a disjunctive normal form DNF to express a policy, bringing in the capability of implementing NOT gate. To prevent collusion attack, we adopt a unique global identity GID for a user to combine his attribute keys and identity. Moreover, we use a central authority to assure the usability of attribute keys a user getting from different attribute authorities, make the verification independent of user's identity, and allow attribute authorities' dynamic change. Our schemes fit the requirements of applications, and also distribute the trust to authorities in the system. In addition, we prove the security of our schemes under computational Diffie-Hellman assumption.