Blind Schnorr signatures and signed ElGamal encryption in the algebraic group model
G Fuchsbauer, A Plouviez, Y Seurin - … on the Theory and Applications of …, 2020 - Springer
The Schnorr blind signing protocol allows blind issuing of Schnorr signatures, one of the
most widely used signatures. Despite its practical relevance, its security analysis is …
most widely used signatures. Despite its practical relevance, its security analysis is …
Practical dynamic group signature with efficient concurrent joins and batch verifications
Dynamic group signatures (DGS) enable a user to generate a signature on behalf of a group
of users, allowing a prospective user to join via an appropriate join protocol. A natural …
of users, allowing a prospective user to join via an appropriate join protocol. A natural …
A generic construction of an anonymous reputation system and instantiations from lattices
With an anonymous reputation system one can realize the process of rating sellers
anonymously in an online shop. While raters can stay anonymous, sellers still have the …
anonymously in an online shop. While raters can stay anonymous, sellers still have the …
[图书][B] Advances in Cryptology–ASIACRYPT 2023: 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou …
J Guo, R Steinfeld - 2023 - books.google.com
The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th
International Conference on the Theory and Application of Cryptology and Information …
International Conference on the Theory and Application of Cryptology and Information …
[PDF][PDF] Advanced Privacy Notions for Electronic Voting and Digital Signatures
A Fraser - 2022 - pure.royalholloway.ac.uk
In the context of electronic voting, the term privacy is used to describe several security goals
that aim to protect a voter's fundamental right to a secret ballot. This thesis adopts this …
that aim to protect a voter's fundamental right to a secret ballot. This thesis adopts this …
sVote with control components voting protocol: computational proof of complete verifiability and privacy
E Larraia, T Finogina, N Costa Mirada - 2022 - upcommons.upc.edu
sVote with Control components is a cryptographic voting protocol that provides complete
verifiability and guarantees voting secrecy and the non-disclosure of early provisional …
verifiability and guarantees voting secrecy and the non-disclosure of early provisional …
The security of the one-more discrete-logarithm assumption and blind Schnorr signatures
A Plouviez - 2021 - theses.hal.science
The one more-discrete logarithm assumption (OMDL) is central to the security analysis of
identification protocols, blind signatures and multi-signature schemes, most notably blind …
identification protocols, blind signatures and multi-signature schemes, most notably blind …