Improved non-interactive zero knowledge with applications to post-quantum signatures
Recent work, including ZKBoo, ZKB++, and Ligero, has developed efficient non-interactive
zero-knowledge proofs of knowledge (NIZKPoKs) for Boolean circuits based on symmetric …
zero-knowledge proofs of knowledge (NIZKPoKs) for Boolean circuits based on symmetric …
Charm: a framework for rapidly prototyping cryptosystems
We describe Charm, an extensible framework for rapidly prototyping cryptographic systems.
Charm provides a number of features that explicitly support the development of new …
Charm provides a number of features that explicitly support the development of new …
A survey on group signatures and ring signatures: Traceability vs. anonymity
MNS Perera, T Nakamura, M Hashimoto, H Yokoyama… - Cryptography, 2022 - mdpi.com
This survey reviews the two most prominent group-oriented anonymous signature schemes
and analyzes the existing approaches for their problem: balancing anonymity against …
and analyzes the existing approaches for their problem: balancing anonymity against …
Compact e-cash
J Camenisch, S Hohenberger… - … Conference on the Theory …, 2005 - Springer
This paper presents efficient off-line anonymous e-cash schemes where a user can
withdraw a wallet containing 2 ℓ coins each of which she can spend unlinkably. Our first …
withdraw a wallet containing 2 ℓ coins each of which she can spend unlinkably. Our first …
Simulation-sound NIZK proofs for a practical language and constant size group signatures
J Groth - Advances in Cryptology–ASIACRYPT 2006: 12th …, 2006 - Springer
Non-interactive zero-knowledge proofs play an essential role in many cryptographic
protocols. We suggest several NIZK proof systems based on prime order groups with a …
protocols. We suggest several NIZK proof systems based on prime order groups with a …
A cryptographic framework for the controlled release of certified data
E Bangerter, J Camenisch, A Lysyanskaya - Security Protocols: 12th …, 2006 - Springer
It is usually the case that before a transaction can take place, some mutual trust must be
established between the participants. On-line, doing so requires the exchange of some …
established between the participants. On-line, doing so requires the exchange of some …
A group signature based secure and privacy-preserving vehicular communication framework
We propose a novel group signature based security framework for vehicular
communications. Compared to the traditional digital signature scheme, the new scheme …
communications. Compared to the traditional digital signature scheme, the new scheme …
Post-quantum era privacy protection for intelligent infrastructures
As we move into a new decade, the global world of Intelligent Infrastructure (II) services
integrated into the Internet of Things (IoT) are at the forefront of technological advancements …
integrated into the Internet of Things (IoT) are at the forefront of technological advancements …
Fully anonymous group signatures without random oracles
J Groth - Advances in Cryptology–ASIACRYPT 2007: 13th …, 2007 - Springer
We construct a new group signature scheme using bilinear groups. The group signature
scheme is practical, both keys and group signatures consist of a constant number of group …
scheme is practical, both keys and group signatures consist of a constant number of group …
Short accountable ring signatures based on DDH
Ring signatures and group signatures are prominent cryptographic primitives offering a
combination of privacy and authentication. They enable individual users to anonymously …
combination of privacy and authentication. They enable individual users to anonymously …