Flexible Multi-Authority Attribute-Based Signature Schemes for Expressive Policy
نویسندگان
چکیده
منابع مشابه
Key-Policy Multi-authority Attribute-Based Encryption
Bilinear groups are often used to create Attribute-Based Encryption (ABE) algorithms. In particular, they have been used to create an ABE system with multi authorities, but limited to the ciphertext-policy instance. Here, for the first time, we propose two multi-authority key-policy ABE systems. In our first proposal, the authorities may be set up in any moment and without any coordination. A p...
متن کاملTraceability, linkability and policy hiding in attribute-based signature schemes
Often we are less concerned with who signed something than with what attributes (director of this company etc.) they have. We propose three Attribute Based Signature schemes, namely, Decentralised Traceable Attribute Based Signatures DTABS, Attribute Based Signatures with UserControlled Linkability ABS-UCL, and Attribute Based Signatures with Hidden Expressive Policy ABS-HEP. The Traceability a...
متن کاملOn Multi-authority Ciphertext-policy Attribute-based Encryption
In classical encryption schemes, data is encrypted under a single key that is associated with a user or group. In Ciphertext-Policy Attribute-Based Encryption(CP-ABE) keys are associated with attributes of users, given to them by a central trusted authority, and data is encrypted under a logical formula over these attributes. We extend this idea to the case where an arbitrary number of independ...
متن کاملMulti-authority Attribute Based Encryption
In an identity based encryption scheme, each user is identified by a unique identity string. An attribute based encryption scheme (ABE), in contrast, is a scheme in which each user is identified by a set of attributes, and some function of those attributes is used to determine decryption ability for each ciphertext. Sahai and Waters introduced a single authority attribute encryption scheme and ...
متن کاملSecure Attribute-based Threshold Signature without a Trusted Central Authority
Currently, in most attribute-based cryptosystem, the central authority that distributes private keys for attributes assigned to the user must be trusted unconditionally otherwise the systems will soon be collapsed. To solve the problem we propose a new attributebased threshold signature scheme without a trusted central authority. When the number of user’s attributes reaches the threshold he can...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Mobile Information Systems
سال: 2012
ISSN: 1574-017X,1875-905X
DOI: 10.1155/2012/736764