Group signatures and more from isogenies and lattices: Generic, simple, and efficient
We construct an efficient dynamic group signature (or more generally an accountable ring
signature) from isogeny and lattice assumptions. Our group signature is based on a simple …
signature) from isogeny and lattice assumptions. Our group signature is based on a simple …
LaRRS: Lattice-based revocable ring signature and its application for VANETs
J Wen, L Bai, Z Yang, H Zhang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Vehicular ad-hoc networks (VANETs) have drawn a lot of attention for their potential to
improve traffic efficiency and safety. To deal with anonymous authentication and message …
improve traffic efficiency and safety. To deal with anonymous authentication and message …
Group signatures and more from isogenies and lattices: generic, simple, and efficient
We construct an efficient dynamic group signature (or more generally an accountable ring
signature) from isogeny and lattice assumptions. Our group signature is based on a simple …
signature) from isogeny and lattice assumptions. Our group signature is based on a simple …
Collusion resistant revocable ring signatures and group signatures from hard homogeneous spaces
Both ring signatures and group signatures are useful privacy tools, allowing signers to hide
their identities within a set of other public keys, while allowing their signatures to be …
their identities within a set of other public keys, while allowing their signatures to be …
Revocable ring signatures with CCA-anonymity from standard lattices
Ring signatures are significant cryptographic primitives used for anonymous authentication
due to their anonymity and spontaneity. However, in some scenarios, they may offer …
due to their anonymity and spontaneity. However, in some scenarios, they may offer …
Towards lightweight provable data possession for cloud storage using indistinguishability obfuscation
S Chaudhari, G Swain - IEEE Access, 2022 - ieeexplore.ieee.org
Cloud Computing has proved to be a boon for many individuals and organizations who
cannot afford infrastructure and maintenance cost of resources. But the untrusted nature of …
cannot afford infrastructure and maintenance cost of resources. But the untrusted nature of …
An anonymous trust-marking scheme on blockchain systems
During the Coincheck incident, which recorded the largest damages in cryptocurrency
history in 2018, it was demonstrated that using Mosaic token can have a certain effect …
history in 2018, it was demonstrated that using Mosaic token can have a certain effect …
A logarithmic-sized accountable ring signature scheme in the standard model
K Hara - Theoretical Computer Science, 2024 - Elsevier
Ring signature and group signature are two major cryptographic primitives providing users
anonymity and authentication simultaneously. While both primitives enable any user to sign …
anonymity and authentication simultaneously. While both primitives enable any user to sign …
Efficient zero-knowledge proofs and their applications
A Cerulli - 2019 - discovery.ucl.ac.uk
A zero-knowledge proof is a fundamental cryptographic primitive that enables the
verification of statements without revealing unnecessary information. Zero-knowledge proofs …
verification of statements without revealing unnecessary information. Zero-knowledge proofs …
[PDF][PDF] Secure and Verifiable Multi-Party Computation Using Indistinguishability Obfuscation
In most practical cloud computing applications such as e-voting, auctions, health, and
financial applications or cloud services in common, to prove the exactness of outsourced …
financial applications or cloud services in common, to prove the exactness of outsourced …