Blind Schnorr signatures and signed ElGamal encryption in the algebraic group model

G Fuchsbauer, A Plouviez, Y Seurin - … on the Theory and Applications of …, 2020 - Springer
The Schnorr blind signing protocol allows blind issuing of Schnorr signatures, one of the
most widely used signatures. Despite its practical relevance, its security analysis is …

Practical dynamic group signature with efficient concurrent joins and batch verifications

H Kim, Y Lee, M Abdalla, JH Park - Journal of information security and …, 2021 - Elsevier
Dynamic group signatures (DGS) enable a user to generate a signature on behalf of a group
of users, allowing a prospective user to join via an appropriate join protocol. A natural …

A generic construction of an anonymous reputation system and instantiations from lattices

J Blömer, J Bobolz, L Porzenheim - … on the Theory and Application of …, 2023 - Springer
With an anonymous reputation system one can realize the process of rating sellers
anonymously in an online shop. While raters can stay anonymous, sellers still have the …

[图书][B] Advances in Cryptology–ASIACRYPT 2023: 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou …

J Guo, R Steinfeld - 2023 - books.google.com
The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th
International Conference on the Theory and Application of Cryptology and Information …

[PDF][PDF] Report on the swiss post e-voting system

T Haines, O Pereira, V Teague - 2022 - bk.admin.ch
1 Executive Summary The Swiss Post e-voting system protocol documentation, code and
security proofs show continuing improvement. The clarity of the protocol and documentation …

[PDF][PDF] Advanced Privacy Notions for Electronic Voting and Digital Signatures

A Fraser - 2022 - pure.royalholloway.ac.uk
In the context of electronic voting, the term privacy is used to describe several security goals
that aim to protect a voter's fundamental right to a secret ballot. This thesis adopts this …

sVote with control components voting protocol: computational proof of complete verifiability and privacy

E Larraia, T Finogina, N Costa Mirada - 2022 - upcommons.upc.edu
sVote with Control components is a cryptographic voting protocol that provides complete
verifiability and guarantees voting secrecy and the non-disclosure of early provisional …

The security of the one-more discrete-logarithm assumption and blind Schnorr signatures

A Plouviez - 2021 - theses.hal.science
The one more-discrete logarithm assumption (OMDL) is central to the security analysis of
identification protocols, blind signatures and multi-signature schemes, most notably blind …

[引用][C] Protocol of the Swiss Post voting system

S Post - Online. Retrieved, 2021