메뉴 건너뛰기




Volumn , Issue , 2014, Pages 49-58

Attribute-based signatures without pairings via the Fiat-Shamir paradigm

Author keywords

access control; attribute; boolean formula; fiat shamir transform; identification; proof system; signature

Indexed keywords

ACCESS CONTROL; IDENTIFICATION (CONTROL SYSTEMS); PUBLIC KEY CRYPTOGRAPHY;

EID: 84903128167     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2600694.2600696     Document Type: Conference Paper
Times cited : (14)

References (15)
  • 1
    • 84947283407 scopus 로고    scopus 로고
    • From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security
    • EUROCRYPT 2002, Springer
    • M. Abdalla, J. H. An, M. Bellare, and C. Namprempre. From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security. In EUROCRYPT 2002, volume 2332 of LNCS, pages 418-433. Springer.
    • LNCS , vol.2332 , pp. 418-433
    • Abdalla, M.1    An, J.H.2    Bellare, M.3    Namprempre, C.4
  • 2
    • 84884493561 scopus 로고    scopus 로고
    • Attribute-Based Identification: Definitions and Efficient Constructions
    • ACISP 2013, Springer
    • H. Anada, S. Arita, S. Handa, and Y. Iwabuchi. Attribute-Based Identification: Definitions and Efficient Constructions. In ACISP 2013, volume 7959 of LNCS, pages 168-186. Springer.
    • LNCS , vol.7959 , pp. 168-186
    • Anada, H.1    Arita, S.2    Handa, S.3    Iwabuchi, Y.4
  • 4
    • 84983104598 scopus 로고    scopus 로고
    • On Defining Proofs of Knowledge
    • CRYPTO '92, Springer
    • M. Bellare and O. Goldreich. On Defining Proofs of Knowledge. In CRYPTO '92, volume 740 of LNCS, pages 390-420. Springer.
    • LNCS , vol.740 , pp. 390-420
    • Bellare, M.1    Goldreich, O.2
  • 5
    • 84937408891 scopus 로고    scopus 로고
    • GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks
    • CRYPTO 2002, Springer
    • M. Bellare and A. Palacio. GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks. In CRYPTO 2002, volume 2442 of LNCS, pages 162-177. Springer.
    • LNCS , vol.2442 , pp. 162-177
    • Bellare, M.1    Palacio, A.2
  • 6
    • 35048841300 scopus 로고    scopus 로고
    • Efficient Selective-ID Secure Identity-Based Encryption without Random Oracles
    • EUROCRYPT 2004, Springer
    • D. Boneh and X. Boyen. Efficient Selective-ID Secure Identity-Based Encryption without Random Oracles. In EUROCRYPT 2004, volume 3027 of LNCS, pages 223-238. Springer.
    • LNCS , vol.3027 , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 7
    • 84945124606 scopus 로고    scopus 로고
    • Multiparty Computation from Threshold Homomorphic Encryption
    • Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
    • R. Cramer, I. Damgård, and J. B. Nielsen. Multiparty Computation from Threshold Homomorphic Encryption. In EUROCRYPT 2001, volume 2045 of LNCS, pages 280-300. Springer. (Pubitemid 33275838)
    • (2001) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2045 , pp. 280-300
    • Cramer, R.1    Damgard, I.2    Nielsen, J.B.3
  • 8
    • 84903162179 scopus 로고    scopus 로고
    • On σ-protocols
    • I. Damgård. On σ-protocols. In Course Notes, http://www.daimi.au.dk/ ivan/Sigma.ps, 2004.
    • (2004) Course Notes
    • Damgård, I.1
  • 9
    • 84990731886 scopus 로고    scopus 로고
    • How to Prove Yourself: Practical Solutions to Identification and Signature Problems
    • CRYPTO '86, Springer
    • A. Fiat and A. Shamir. How to Prove Yourself: Practical Solutions to Identification and Signature Problems. In CRYPTO '86, volume 263 of LNCS, pages 186-194. Springer.
    • LNCS , vol.263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 10
    • 34547273527 scopus 로고    scopus 로고
    • Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data
    • ACM
    • V. Goyal, O. Pandey, A. Sahai, and B. Waters. Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data. In ACM-CCS '06, volume 263, pages 89-98. ACM.
    • ACM-CCS '06 , vol.263 , pp. 89-98
    • Goyal, V.1    Pandey, O.2    Sahai, A.3    Waters, B.4
  • 11
    • 51349090469 scopus 로고    scopus 로고
    • Attribute-Based Signature Scheme
    • IEEE
    • S. Guo and Y. Zeng. Attribute-Based Signature Scheme. In ISA '08, pages 509-511. IEEE.
    • ISA '08 , pp. 509-511
    • Guo, S.1    Zeng, Y.2
  • 13
    • 79951783454 scopus 로고    scopus 로고
    • Attribute-Based Signatures
    • CT-RSA 2011, Springer
    • H. K. Maji, M. Prabhakaran, and M. Rosulek. Attribute-Based Signatures. In CT-RSA 2011, volume 6558 of LNCS, pages 376-392. Springer.
    • LNCS , vol.6558 , pp. 376-392
    • Maji, H.K.1    Prabhakaran, M.2    Rosulek, M.3
  • 14
    • 79952521355 scopus 로고    scopus 로고
    • Efficient Attribute-Based Signatures for Non-monotone Predicates in the standard model
    • PKC 2011, Springer
    • T. Okamoto and K. Takashima. Efficient Attribute-Based Signatures for Non-monotone Predicates in the standard model. In PKC 2011, volume 6571 of LNCS, pages 35-52. Springer.
    • LNCS , vol.6571 , pp. 35-52
    • Okamoto, T.1    Takashima, K.2
  • 15
    • 0000537828 scopus 로고    scopus 로고
    • Efficient Identification and Signatures for Smart cards
    • CRYPTO '89, Springer
    • C. P. Schnorr. Efficient Identification and Signatures for Smart cards. In CRYPTO '89, volume 435 of LNCS, pages 239-252. Springer.
    • LNCS , vol.435 , pp. 239-252
    • Schnorr, C.P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.