Group signatures and more from isogenies and lattices: Generic, simple, and efficient

W Beullens, S Dobson, S Katsumata, YF Lai… - … Conference on the …, 2022 - Springer
We construct an efficient dynamic group signature (or more generally an accountable ring
signature) from isogeny and lattice assumptions. Our group signature is based on a simple …

LaRRS: Lattice-based revocable ring signature and its application for VANETs

J Wen, L Bai, Z Yang, H Zhang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Vehicular ad-hoc networks (VANETs) have drawn a lot of attention for their potential to
improve traffic efficiency and safety. To deal with anonymous authentication and message …

Group signatures and more from isogenies and lattices: generic, simple, and efficient

W Beullens, S Dobson, S Katsumata, YF Lai… - Designs, Codes and …, 2023 - Springer
We construct an efficient dynamic group signature (or more generally an accountable ring
signature) from isogeny and lattice assumptions. Our group signature is based on a simple …

Collusion resistant revocable ring signatures and group signatures from hard homogeneous spaces

YF Lai, S Dobson - Cryptology ePrint Archive, 2021 - eprint.iacr.org
Both ring signatures and group signatures are useful privacy tools, allowing signers to hide
their identities within a set of other public keys, while allowing their signatures to be …

Revocable ring signatures with CCA-anonymity from standard lattices

J Wen, W Susilo, R Yang, Z Yu, H Zhang - Computer Standards & Interfaces, 2024 - Elsevier
Ring signatures are significant cryptographic primitives used for anonymous authentication
due to their anonymity and spontaneity. However, in some scenarios, they may offer …

Towards lightweight provable data possession for cloud storage using indistinguishability obfuscation

S Chaudhari, G Swain - IEEE Access, 2022 - ieeexplore.ieee.org
Cloud Computing has proved to be a boon for many individuals and organizations who
cannot afford infrastructure and maintenance cost of resources. But the untrusted nature of …

An anonymous trust-marking scheme on blockchain systems

T Sato, K Emura, T Fujitani, K Omote - IEEE Access, 2021 - ieeexplore.ieee.org
During the Coincheck incident, which recorded the largest damages in cryptocurrency
history in 2018, it was demonstrated that using Mosaic token can have a certain effect …

A logarithmic-sized accountable ring signature scheme in the standard model

K Hara - Theoretical Computer Science, 2024 - Elsevier
Ring signature and group signature are two major cryptographic primitives providing users
anonymity and authentication simultaneously. While both primitives enable any user to sign …

Efficient zero-knowledge proofs and their applications

A Cerulli - 2019 - discovery.ucl.ac.uk
A zero-knowledge proof is a fundamental cryptographic primitive that enables the
verification of statements without revealing unnecessary information. Zero-knowledge proofs …

[PDF][PDF] Secure and Verifiable Multi-Party Computation Using Indistinguishability Obfuscation

S Chaudhari, G Swain, P Mishra - International Journal of Intelligent …, 2020 - academia.edu
In most practical cloud computing applications such as e-voting, auctions, health, and
financial applications or cloud services in common, to prove the exactness of outsourced …