k-times attribute-based authentication scheme using direct anonymous attestation
s: At present, the main drawbacks of existing k-times attribute-based authentication (abbreviated to k-TABA) schemes and related attribute-based authentication schemes are that the computation cost of the authentication process depends on the size of the access formula and none of these schemes cons...
Saved in:
| Main Authors: | Xin LIU, Qiuliang XU, Bin ZHANG, Bo ZHANG |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Editorial Department of Journal on Communications
2018-12-01
|
| Series: | Tongxin xuebao |
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018279/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Attribute-based encryption scheme supporting attribute revocation in cloud storage environment
by: Lei SUN, et al.
Published: (2019-05-01) -
Attribute-based encryption scheme supporting attribute revocation in cloud storage environment
by: Lei SUN, et al.
Published: (2019-05-01) -
Attribute-based proxy re-encryption scheme with multiple features
by: Chaosheng FENG, et al.
Published: (2019-06-01) -
A privacy-preserving and efficient data sharing scheme with trust authentication based on blockchain for mHealth
by: Shujiang Xu, et al.
Published: (2023-12-01) -
Verifiable outsourced attribute-based encryption with access update
by: Suqing LIN
Published: (2019-02-01)