Traceable constant-size multi-authority credentials
نویسندگان
چکیده
Many attribute-based anonymous credential (ABC) schemes have been proposed, enabling users to anonymously prove possession of attributes. Recent papers introduced constant-size credentials issued by a single issuer for showing subset However, proving attributes from multiple issuers typically requires independent credentials. Only aggregate signature-based can overcome this limitation. This paper presents new ABC using signatures with randomizable tags. The consider malicious issuers, adaptive corruptions, and collusions users. While our constructions only support selective attribute disclosures remain compact, approach significantly improves the complexity in time memory For first time, cost prover becomes (almost) number issuers. Whereas require privacy user, we also propose allowing traceability specific tracing authority.
منابع مشابه
Fair Traceable Multi-Group Signatures
This paper presents fair traceable multi-group signatures (FTMGS), which have enhanced capabilities, compared to group and traceable signatures, that are important in real world scenarios combining accountability and anonymity. The main goal of the primitive is to allow multiple groups that are managed separately (managers are not even aware of the other ones), yet allowing users (in the spirit...
متن کاملTowards traceable size determination of extracellular vesicles
BACKGROUND Extracellular vesicles (EVs) have clinical importance due to their roles in a wide range of biological processes. The detection and characterization of EVs are challenging because of their small size, low refractive index, and heterogeneity. METHODS In this manuscript, the size distribution of an erythrocyte-derived EV sample is determined using state-of-the-art techniques such as ...
متن کاملMulti-authority Attribute Based Encryption
In an identity based encryption scheme, each user is identified by a unique identity string. An attribute based encryption scheme (ABE), in contrast, is a scheme in which each user is identified by a set of attributes, and some function of those attributes is used to determine decryption ability for each ciphertext. Sahai and Waters introduced a single authority attribute encryption scheme and ...
متن کاملTraceable Visual Cryptography Traceable Visual Cryptography
In this paper we present a new k out of n visual cryptography scheme which does not only meet the requirements of the basic visual cryptography scheme deened by Naor and Shamir 5] but is also traceable. With a k out of n scheme it is not possible to reveal the original secret by stacking less than k transparencies. In general one can assume that it is very unlikely that there are k shareholders...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information & Computation
سال: 2023
ISSN: ['0890-5401', '1090-2651']
DOI: https://doi.org/10.1016/j.ic.2023.105060