k-times attribute-based authentication scheme using direct anonymous attestation

s: At present, the main drawbacks of existing k-times attribute-based authentication (abbreviated to k-TABA) schemes and related attribute-based authentication schemes are that the computation cost of the authentication process depends on the size of the access formula and none of these schemes cons...

Full description

Saved in:
Bibliographic Details
Main Authors: Xin LIU, Qiuliang XU, Bin ZHANG, Bo ZHANG
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2018-12-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018279/
Tags: Add Tag
No Tags, Be the first to tag this record!