Computer Science ›› 2015, Vol. 42 ›› Issue (2): 142-146.doi: 10.11896/j.issn.1002-137X.2015.02.031
Previous Articles Next Articles
REN Yan
[1] Sahai A,Waters B.Fuzzy identity-based encryption[M]∥Ad-vances in Cryptology-EUROCRYPT 2005.Springer Berlin Heidelberg,2005:457-473 [2] Yang P,Cao Z,Dong X.Fuzzy Identity Based Signature with applications to biometric authentication[J].Computer Electrical Engineering,2011,7(4):532-540 [3] Shaniqng G,Yingpei Z.Attribute-based signature scheme[C]∥International Conference on Information Security and Assurance,2008(ISA 2008).IEEE,2008:509-511 [4] Li J,Kim K.Hidden attribute-based signatures without anonym-ity revocation[J].Information Sciences,2010,180(9):1681-1689 [5] Li J,Au M H,Susilo W,et al.Attribute-based signature and its applications[C]∥Proceedings of the 5th ACM Symposium on Information,Computer and Communications Security.ACM,2010:60-69 [6] Escala A,Herranz J,Morillo P.Revocable attribute-based signatures with adaptive security in the standard model[M]∥Progress in Cryptology-AFRICACRYPT 2011.Springer Berlin Heidelberg,2011:224-241 [7] Maji H K,Prabhakaran M,Rosulek M.Attribute-Based Signatures:Achieving Attribute-Privacy and Collusion-Resistance.http://eprint.iacr.org/2008/328.pdf [8] Khader D.Attribute Based Group Signatures.http://eprint.iacr.org/2007/159.pdf [9] Khader D.Attribute Based Group Signature with Revocation.http://eprint.iacr.org/2007/241.pdf [10] Li J,Kim K.Attribute-Based Ring Signatures.http://epring.iacr.org/2008/394.pdf [11] Li J,Huang Q,Chen X,et al.Multi-authority ciphertext-policy attribute-based encryption with accountability[C]∥Proceedings of the 6th ACM Symposium on Information,Computer and Communications Security.ACM,2011:386-390 [12] Shahandashti S F,Safavi-Naini R.Threshold attribute-based signatures and their application to anonymous credential systems[M]∥Progress in Cryptology-AFRICACRYPT 2009.Springer Berlin Heidelberg,2009:198-216 [13] Maji H K,Prabhakaran M,Rosulek M.Attribute-based signatures[M]∥Topics in Cryptology-CT-RSA 2011.Springer Berlin Heidelberg,2011:376-392 [14] Okamoto T,Takashima K.Efficient attribute-based signa-tures for non-monotone predicates in the standard model[M]∥Public Key Cryptography-PKC 2011.Springer Berlin Heidelberg,2011:35-52 [15] Goyal V.Reducing trust in the PKG in identity based cryptosystems[M]∥Advances in Cryptology-CRYPTO 2007.Springer Berlin Heidelberg,2007:430-447 |
No related articles found! |
|