Hidden attribute-based signatures without anonymity revocation

@article{Li2010HiddenAS,
  title={Hidden attribute-based signatures without anonymity revocation},
  author={Jin Li and Kwangjo Kim},
  journal={Inf. Sci.},
  year={2010},
  volume={180},
  pages={1681-1689}
}
We propose a new notion called hidden attribute-based signature, which is inspired by the recent developments in attribute-based cryptosystem. With this technique, users are able to sign messages with any subset of their attributes issued from an attribute center. In this notion, a signature attests not to the identity of the individual who endorsed a message, but instead to a claim regarding the attributes the underlying signer possesses. Users cannot forge signature with attributes which they… CONTINUE READING
Highly Cited
This paper has 128 citations. REVIEW CITATIONS

From This Paper

Topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 71 extracted citations

Information Security and Cryptology - ICISC 2011

Lecture Notes in Computer Science • 2011
View 6 Excerpts
Highly Influenced

Attribute-based key-insulated signature for boolean formula

Int. J. Comput. Math. • 2016
View 4 Excerpts
Highly Influenced

Cloud data security using attribute-based key-aggregate cryptosystem

2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET) • 2016
View 9 Excerpts
Highly Influenced

Privacy protection based access control scheme in cloud-based services

2016 IEEE/CIC International Conference on Communications in China (ICCC) • 2016
View 5 Excerpts
Highly Influenced

CHARIOT: Cloud-Assisted Access Control for the Internet of Things

2018 16th Annual Conference on Privacy, Security and Trust (PST) • 2018
View 1 Excerpt

Achieving Secure and Fine-Grained Data Authentication in Cloud Computing Using Attribute Based Proxy Signature

2017 4th International Conference on Information Science and Control Engineering (ICISCE) • 2017

129 Citations

02040'11'13'15'17'19
Citations per Year
Semantic Scholar estimates that this publication has 129 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 24 references

Attribute-based encryption for fine-grained access control of encrypted data

ACM Conference on Computer and Communications Security • 2006
View 4 Excerpts
Highly Influenced

Efficient identity-based encryption without random oracles

IACR Cryptology ePrint Archive • 2004
View 4 Excerpts
Highly Influenced

How to Leak a Secret

View 4 Excerpts
Highly Influenced

Fuzzy Identity Based Encryption

IACR Cryptology ePrint Archive • 2004
View 7 Excerpts
Highly Influenced

Attribute-based Signature Scheme

2008 International Conference on Information Security and Assurance (isa 2008) • 2008
View 1 Excerpt

M

H. Maji, M. Prabhakaran
Rosulek, Attribute based signatures: achieving attribute privacy and collusion–resistance • 2008
View 1 Excerpt

X

P. Yang, Z. Cao
Dong, Fuzzy identity based signature • 2008
View 1 Excerpt

Similar Papers

Loading similar papers…