On the implementation of a pairing-based cryptographic protocol in a constrained device

S Canard, N Desmoulins, J Devigne… - … Conference on Pairing …, 2012 - Springer
In this paper, we consider a pairing-based cryptographic protocol and the way to implement
it on a restricted device such as a mobile phone or a smart card. Our aim is to show the …

Group signatures on mobile devices: Practical experiences

K Potzmader, J Winter, D Hein, C Hanser… - Trust and Trustworthy …, 2013 - Springer
Group signature schemes enable participants to sign on behalf of a group in an anonymous
manner. The upcoming ISO20008-2 standard defines seven such schemes, which differ in …

Linking-based revocation for group signatures: A pragmatic approach for efficient revocation checks

D Slamanig, R Spreitzer, T Unterluggauer - Paradigms in Cryptology …, 2017 - Springer
Group signature schemes (GSS) represent an important privacy-enhancing technology.
However, their practical applicability is restricted due to inefficiencies of existing …

On the practicability of using group signatures on mobile devices: implementation and performance analysis on the android platform

AP Isern-Deyà, L Huguet-Rotger… - International Journal of …, 2015 - Springer
A group signature is a convenient cryptographic primitive to tackle with authentication and
privacy problems. In the literature, it is used as an underlying black box by several …

Toward generic method for server-aided cryptography

S Canard, I Coisel, J Devigne, C Gallais… - … Conference, ICICS 2013 …, 2013 - Springer
Portable devices are very useful to access services from anywhere at any time. However,
when the security underlying the service requires complex cryptography, implying the …

Efficient delegation of zero-knowledge proofs of knowledge in a pairing-friendly setting

S Canard, D Pointcheval, O Sanders - … on Practice and Theory in Public …, 2014 - Springer
Since their introduction in 1985, by Goldwasser, Micali and Rackoff, followed by Feige, Fiat
and Shamir, zero-knowledge proofs have played a significant role in modern cryptography …

Group-signature schemes on constrained devices: the gap between theory and practice

R Spreitzer, JM Schmidt - Proceedings of the First Workshop on …, 2014 - dl.acm.org
Group-signature schemes allow members within a predefined group to prove specific
properties without revealing more information than necessary. Potential areas of application …

Evaluation of anonymous digital signatures for privacy-enhancing mobile applications

L Malina, P Dzurenda, J Hajny - International Journal of …, 2018 - inderscienceonline.com
Privacy-enhancing mobile applications that employ anonymous digital signature (ADS)
schemes can be beneficial for users who strongly concern about their privacy and security …

[PDF][PDF] Group Signatures with Linking-Based Revocation: A Pragmatic Approach for Efficient Revocation Checks.

D Slamanig, R Spreitzer… - IACR Cryptol. ePrint …, 2016 - iacr.steepath.eu
Group signatures represent an important mechanism for privacy-preserving applications.
However, their practical applicability is restricted due to inefficiencies of existing …

Protocoles de re-chiffrement pour le stockage de données

J Devigne - 2013 - hal.science
La protection de la vie privée est un des enjeux majeurs de la société moderne dans
laquelle Internet est omnipotent. Dans cette thèse, nous étudions des techniques permettant …