Short randomizable signatures
D Pointcheval, O Sanders - Topics in Cryptology-CT-RSA 2016: The …, 2016 - Springer
Digital signature is a fundamental primitive with numerous applications. Following the
development of pairing-based cryptography, several taking advantage of this setting have …
development of pairing-based cryptography, several taking advantage of this setting have …
A survey on group signatures and ring signatures: Traceability vs. anonymity
MNS Perera, T Nakamura, M Hashimoto, H Yokoyama… - Cryptography, 2022 - mdpi.com
This survey reviews the two most prominent group-oriented anonymous signature schemes
and analyzes the existing approaches for their problem: balancing anonymity against …
and analyzes the existing approaches for their problem: balancing anonymity against …
Efficient non-interactive proof systems for bilinear groups
Non-interactive zero-knowledge proofs and non-interactive witness-indistinguishable proofs
have played a significant role in the theory of cryptography. However, lack of efficiency has …
have played a significant role in the theory of cryptography. However, lack of efficiency has …
Structure-preserving signatures and commitments to group elements
M Abe, G Fuchsbauer, J Groth, K Haralambiev… - Advances in Cryptology …, 2010 - Springer
A modular approach for cryptographic protocols leads to a simple design but often inefficient
constructions. On the other hand, ad hoc constructions may yield efficient protocols at the …
constructions. On the other hand, ad hoc constructions may yield efficient protocols at the …
A survey of noninteractive zero knowledge proof system and its applications
H Wu, F Wang - The scientific world journal, 2014 - Wiley Online Library
Zero knowledge proof system which has received extensive attention since it was proposed
is an important branch of cryptography and computational complexity theory. Thereinto …
is an important branch of cryptography and computational complexity theory. Thereinto …
A group signature scheme from lattice assumptions
Group signature schemes allow users to sign messages on behalf of a group while (1)
maintaining anonymity (within that group) with respect to an outside observer, yet (2) …
maintaining anonymity (within that group) with respect to an outside observer, yet (2) …
Signature schemes with efficient protocols and dynamic group signatures from lattice assumptions
A recent line of works–initiated by Gordon, Katz and Vaikuntanathan (Asiacrypt 2010)–gave
lattice-based constructions allowing users to authenticate while remaining hidden in a …
lattice-based constructions allowing users to authenticate while remaining hidden in a …
Group signatures and more from isogenies and lattices: Generic, simple, and efficient
We construct an efficient dynamic group signature (or more generally an accountable ring
signature) from isogeny and lattice assumptions. Our group signature is based on a simple …
signature) from isogeny and lattice assumptions. Our group signature is based on a simple …
Post-quantum era privacy protection for intelligent infrastructures
As we move into a new decade, the global world of Intelligent Infrastructure (II) services
integrated into the Internet of Things (IoT) are at the forefront of technological advancements …
integrated into the Internet of Things (IoT) are at the forefront of technological advancements …
Short accountable ring signatures based on DDH
Ring signatures and group signatures are prominent cryptographic primitives offering a
combination of privacy and authentication. They enable individual users to anonymously …
combination of privacy and authentication. They enable individual users to anonymously …