2011
DOI: 10.1007/978-3-642-19074-2_24
|View full text |Cite
|
Sign up to set email alerts
|

Attribute-Based Signatures

Abstract: We introduce Attribute-Based Signatures (ABS), a versatile primitive that allows a party to sign a message with fine-grained control over identifying information. In ABS, a signer, who possesses a set of attributes from the authority, can sign a message with a predicate that is satisfied by his attributes. The signature reveals no more than the fact that a single user with some set of attributes satisfying the predicate has attested to the message. In particular, the signature hides the attributes used to sati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

2
342
0
2

Year Published

2012
2012
2021
2021

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 336 publications
(346 citation statements)
references
References 32 publications
2
342
0
2
Order By: Relevance
“…Our scheme builds on the work by Bethencourt et al, Ciphertext-policy attribute-based encryption (CP-ABE) [3], and Maji et al, Attribute-based signature (ABS) [14]. Only a conceptual introduction is given here, please refer to Appendix A for a more detailed algorithm description.…”
Section: Technical Preliminariesmentioning
confidence: 99%
“…Our scheme builds on the work by Bethencourt et al, Ciphertext-policy attribute-based encryption (CP-ABE) [3], and Maji et al, Attribute-based signature (ABS) [14]. Only a conceptual introduction is given here, please refer to Appendix A for a more detailed algorithm description.…”
Section: Technical Preliminariesmentioning
confidence: 99%
“…Attribute-based signatures (shortened as ABS in the sequel) have been introduced more recently in [24] (see also [30,21,22]). They are related to the notion of (threshold) ring signatures [28,7] or mesh signatures [6], but offer much more flexibility and versatility to design secure complex systems, since the signatures are linked not to the users themselves, but to their attributes.…”
Section: Introductionmentioning
confidence: 99%
“…They are related to the notion of (threshold) ring signatures [28,7] or mesh signatures [6], but offer much more flexibility and versatility to design secure complex systems, since the signatures are linked not to the users themselves, but to their attributes. As a consequence, these signatures have a wide range of applications, like private access control, anonymous credentials, trust negotiations, distributed access control mechanisms for ad hoc networks, attribute-based messaging... (see [24] for detailed descriptions of applications). In terms of security, ABS must first satisfy unforgeability, which guarantees that a signature cannot be computed by a user who does not have the right attributes, even if he colludes with other users by pooling together their secret keys.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations