Policy-Based Signatures

نویسندگان

  • Mihir Bellare
  • Georg Fuchsbauer
چکیده

We introduce signatures where signers can only sign messages that conform to some policy, yet privacy of the policy is maintained. We provide definitions and show that policy-based signatures provide a framework which yields a unified view of many other existing types of signatures that now appear as special cases. We also show how still other primitives are easily realized using policy-based signatures as a building block. We provide generic constructions of policy-based signatures and then show how to achieve them efficiently.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Traceability, linkability and policy hiding in attribute-based signature schemes

Often we are less concerned with who signed something than with what attributes (director of this company etc.) they have. We propose three Attribute Based Signature schemes, namely, Decentralised Traceable Attribute Based Signatures DTABS, Attribute Based Signatures with UserControlled Linkability ABS-UCL, and Attribute Based Signatures with Hidden Expressive Policy ABS-HEP. The Traceability a...

متن کامل

Policy-based Signatures for Predicates

Policy-based Signatures (PBS), which were introduced by Bellare and Fuchsbauer, enable signers to sign messages that conform to some policy, yet privacy of the policy is maintained. Bellare et al. defined the policy in any NP language. In PBS schemes for NP language, one should have a valid witness for the policy checking and signing algorithms. In this work, we consider the case of PBS for P l...

متن کامل

Parametrization of Pedestrian Injuries and its Utilisation in Proving Traffic Accidents Course Using Injury Signatures and Contact Signatures

Background: The paper points out the present limited possibility of using the verbal description of injuries for the needs of experts from the field of road transportation as relevant criminalistics traces, as well as the options of the FORTIS system that creates a new area for a deeper interdisciplinary approach in the field of expert evidence. Further a description of how to create injury si...

متن کامل

Position Paper: Privacy-Aware Proof-Carrying Authorization

Proof-carrying authorization (PCA) is one of the most popular approaches for the enforcement of access control policies. In a nutshell, the idea is to formalize a policy as a set of logical rules and to let the requester construct a formal proof showing that she has permissions to access the desired resource according to the provider’s policy. This policy may depend on logical formulas that are...

متن کامل

تولید خودکار الگوهای نفوذ جدید با استفاده از طبقه‌بندهای تک کلاسی و روش‌های یادگیری استقرایی

In this paper, we propose an approach for automatic generation of novel intrusion signatures. This approach can be used in the signature-based Network Intrusion Detection Systems (NIDSs) and for the automation of the process of intrusion detection in these systems. In the proposed approach, first, by using several one-class classifiers, the profile of the normal network traffic is established. ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2013  شماره 

صفحات  -

تاریخ انتشار 2013