搜索结果: 1-14 共查到“军事学 Traceable”相关记录14条 . 查询时间(0.151 秒)
Traceable and linkable ring signatures, traceable range proofs and applications on regulatable privacy-preserving blockchains
regulatable blockchain privacy preserving decentralization
2019/8/19
Privacy protection has been extensively studied in the current blockchain research field. As representations, Monero and Zerocash have realized completely anonymous and amount-hiding transactions. How...
A Traceable Ring Signature Scheme based on Coding Theory
cryptographic protocols digital signatures
2019/4/1
Traceable ring signatures are a variant of ring signatures which allows the identity of a user to be revealed, when it signs two different messages with respect to the same group of users. It has appl...
Versatile ABS: Usage Limited, Revocable, Threshold Traceable, Authority Hiding, Decentralized Attribute Based Signatures
attribute based signature anonymous credentials threshold cryptography
2019/3/1
In this work, we revisit multi-authority attribute based signatures (MA-ABS), and elaborate on the limitations of the current MA-ABS schemes to provide a hard to achieve (yet very useful) combination ...
On Enabling Attribute-Based Encryption to Be Traceable against Traitors
Attribute-Based Encryption Traitor Tracing Framework
2018/11/6
Attribute-Based Encryption (ABE) is a versatile one-to-many encryption primitive which enables fine-grained access control over encrypted data. Due to its promising applications in practice, ABE has b...
Constant Size Traceable Ring Signature Scheme without Random Oracles
ring signature traceability constant size signature
2018/3/29
Currently several traceable (or linkable) identity-based ring signature schemes have been proposed. However, most of them are constructed in the random oracle model. In this paper, we present a fully ...
Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions
Attribute-based signatures security definitions traceability
2016/1/23
In this work, we revisit the notion of Decentralized Traceable Attribute-Based Signatures (DTABS) introduced by El Kaafarani et al. (CT-RSA 2014) and improve the state-of-the-art in three dimensions:...
Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts
Attribute-Based Encryption Key-Policy Blackbox Traceability
2016/1/7
Recently a series of expressive, secure and efficient Attribute-Based Encryption (ABE)
schemes, both in key-policy flavor and ciphertext-policy flavor, have been proposed. However, before
being appl...
This paper introduces a new P2P Electronic Cash system called Netcoin. The purpose of Netcoin is to facilitate inexpensive peer-to-peer monetary transactions on the Web. Its salient features are that ...
Traceable CP-ABE on Prime Order Groups: Fully Secure and Fully Collusion-resistant Blackbox Traceable
Traceable Ciphertext-policy Attribute Based Encryption Prime Order Groups
2015/12/23
In Ciphertext-Policy Attribute-Based Encryption (CP-ABE), access policies associated with
the ciphertexts are generally role-based and the attributes satisfying the policies are generally shared by
...
Decentralized Traceable Attribute-Based Signatures
Attribute-based signatures security definitions standard model
2014/3/5
Attribute-based signatures allow a signer owning a set of attributes to anonymously sign a message w.r.t.\ some signing policy. A recipient of the signature is convinced that a signer with a set of at...
Fair Traceable Multi-Group Signatures
Fair Traceable Multi-Group Signatures FTMGS anonymity revocation
2009/6/2
This paper presents fair traceable multi-group signatures (FTMGS), which have enhanced
capabilities, compared to group and traceable signatures, that are important in real world scenarios
combining ...
We present, implement and apply a new privacy primitive that we call “Traceable Signatures.”
To this end we develop the underlying mathematical and protocol tools, present the concepts and
the under...
The ring signature allows a signer to leak secrets anonymously, without the risk of identity
escrow. At the same time, the ring signature provides great flexibility: No group manager, no
special set...
Perturbing and Protecting a Traceable Block Cipher
Traitor tracing Isomorphism of Polynomials (IP) problem perturbation
2008/10/30
At the Asiacrypt 2003 conference Billet and Gilbert introduce a
block cipher, which, to quote them, has the following paradoxical traceability
properties: it is computationally easy to derive many e...