Authenticating with Attributes

نویسنده

  • Dalia Khader
چکیده

Attribute based group signature (ABGS) is a a new generation of group signature schemes. In such a scheme the verifier could define the role of a signer within the group. He determines the attributes possessed by the member signing the document. In this paper we propose the first ABGS scheme with multi-authorities and define its security notions. We construct an ABGS that is proved to be fully traceable and fully anonymous. Our scheme is efficient and secure.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Authenticating ‘Cover to Cover’ Reader Series vis-à-vis Cultural Norms for the Iranian community

This research study was an attempt to explore hidden cultural components in an ELT textbook from Oxford University Press (OUP) titled 'Cover to Cover'. Two research methodologies were relied on to unveil the western ideologies in this series: Firstly, a qualitative review over its reading textbooks was undertaken for authenticating the hidden western values for Iranian contexts. At this stage, ...

متن کامل

Designing and Authenticating a Problem Based Curriculum model in Elementary Mathematics

Abstract The main purpose of the study is to design a valid model for the problem-oriented curriculum in elementary mathematics. The research approach is quantitative. In designing the model, which was done by structural-interpretive modeling method, 19 specialists of curriculum planning and mathematical education of Arak city participated. To determine the validity, with the method of partial ...

متن کامل

Authenticated Index Structures for Aggregation Queries in Outsourced Databases

In an outsourced database system the data owner publishes information through a number of remote, untrusted servers with the goal of enabling clients to access and query the data more efficiently. As clients cannot trust servers, query authentication is an essential component in any outsourced database system. Clients should be given the capability to verify that the answers provided by the ser...

متن کامل

Authentication For Fragments

Recently there’s been renewed interest in authenticating fragments, especially for mobile wireless networks and delay tolerant networks. In this paper we review the issues in authenticating fragments and show how painfully hard that process is. We then suggest a few new ideas for reducing the authentication data that must be transmitted, which may make authenticating fragments a little less pai...

متن کامل

Incorporating Leveled Homomorphic Encryption-based Private Information Retrieval in Federated eID Schemes to Enhance User Privacy

Numerous services are being offered over the Internet and require identification of users as in face-to-face interactions. To simplify the authentication procedure and reduce the need to manage multiple credentials to access services, Electronic Identification (eID) schemes have been introduced. eID schemes commonly involve many service providers (SPs) which provide services, such as online sho...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2008  شماره 

صفحات  -

تاریخ انتشار 2008