zk-creds: Flexible anonymous credentials from zksnarks and existing identity infrastructure

M Rosenberg, J White, C Garman… - 2023 IEEE Symposium …, 2023‏ - ieeexplore.ieee.org
Frequently, users on the web need to show that they are, for example, not a robot, old
enough to access an age restricted video, or eligible to download an ebook from their local …

Bolt: Anonymous payment channels for decentralized currencies

M Green, I Miers - Proceedings of the 2017 ACM SIGSAC conference on …, 2017‏ - dl.acm.org
Bitcoin owes its success to the fact that transactions are transparently recorded in the
blockchain, a global public ledger that removes the need for trusted parties. Unfortunately …

Short randomizable signatures

D Pointcheval, O Sanders - Topics in Cryptology-CT-RSA 2016: The …, 2016‏ - Springer
Digital signature is a fundamental primitive with numerous applications. Following the
development of pairing-based cryptography, several taking advantage of this setting have …

Privacy and data protection by design-from policy to engineering

G Danezis, J Domingo-Ferrer, M Hansen… - arxiv preprint arxiv …, 2015‏ - arxiv.org
Privacy and data protection constitute core values of individuals and of democratic societies.
There have been decades of debate on how those values-and legal obligations-can be …

[HTML][HTML] Selective disclosure in digital credentials: A review

ŠB Ramić, E Cogo, I Prazina, E Cogo, M Turkanović… - ICT Express, 2024‏ - Elsevier
Digital credentials represent digital versions of physical credentials. They are the
cornerstone of digital identity on the Internet. In order to enhance privacy, different authors …

On the (in) security of ROS

F Benhamouda, T Lepoint, J Loss, M Orrù… - Journal of …, 2022‏ - Springer
We present an algorithm solving the ROS (R andom inhomogeneities in a O verdetermined
S olvable system of linear equations) problem mod p in polynomial time for ℓ> log p …

Coconut: Threshold issuance selective disclosure credentials with applications to distributed ledgers

A Sonnino, M Al-Bassam, S Bano, S Meiklejohn… - arxiv preprint arxiv …, 2018‏ - arxiv.org
Coconut is a novel selective disclosure credential scheme supporting distributed threshold
issuance, public and private attributes, re-randomization, and multiple unlinkable selective …

Blind Schnorr signatures and signed ElGamal encryption in the algebraic group model

G Fuchsbauer, A Plouviez, Y Seurin - … on the Theory and Applications of …, 2020‏ - Springer
The Schnorr blind signing protocol allows blind issuing of Schnorr signatures, one of the
most widely used signatures. Despite its practical relevance, its security analysis is …

Geppetto: Versatile verifiable computation

C Costello, C Fournet, J Howell… - … IEEE Symposium on …, 2015‏ - ieeexplore.ieee.org
Cloud computing sparked interest in Verifiable Computation protocols, which allow a weak
client to securely outsource computations to remote parties. Recent work has dramatically …

With a little help from my friends: Constructing practical anonymous credentials

L Hanzlik, D Slamanig - Proceedings of the 2021 ACM SIGSAC …, 2021‏ - dl.acm.org
Anonymous credentials (ACs) are a powerful cryptographic tool for the secure use of digital
services, when simultaneously aiming for strong privacy guarantees of users combined with …