On the implementation of a pairing-based cryptographic protocol in a constrained device
S Canard, N Desmoulins, J Devigne… - … Conference on Pairing …, 2012 - Springer
In this paper, we consider a pairing-based cryptographic protocol and the way to implement
it on a restricted device such as a mobile phone or a smart card. Our aim is to show the …
it on a restricted device such as a mobile phone or a smart card. Our aim is to show the …
Group signatures on mobile devices: Practical experiences
Group signature schemes enable participants to sign on behalf of a group in an anonymous
manner. The upcoming ISO20008-2 standard defines seven such schemes, which differ in …
manner. The upcoming ISO20008-2 standard defines seven such schemes, which differ in …
Linking-based revocation for group signatures: A pragmatic approach for efficient revocation checks
Group signature schemes (GSS) represent an important privacy-enhancing technology.
However, their practical applicability is restricted due to inefficiencies of existing …
However, their practical applicability is restricted due to inefficiencies of existing …
On the practicability of using group signatures on mobile devices: implementation and performance analysis on the android platform
A group signature is a convenient cryptographic primitive to tackle with authentication and
privacy problems. In the literature, it is used as an underlying black box by several …
privacy problems. In the literature, it is used as an underlying black box by several …
Toward generic method for server-aided cryptography
S Canard, I Coisel, J Devigne, C Gallais… - … Conference, ICICS 2013 …, 2013 - Springer
Portable devices are very useful to access services from anywhere at any time. However,
when the security underlying the service requires complex cryptography, implying the …
when the security underlying the service requires complex cryptography, implying the …
Efficient delegation of zero-knowledge proofs of knowledge in a pairing-friendly setting
Since their introduction in 1985, by Goldwasser, Micali and Rackoff, followed by Feige, Fiat
and Shamir, zero-knowledge proofs have played a significant role in modern cryptography …
and Shamir, zero-knowledge proofs have played a significant role in modern cryptography …
Group-signature schemes on constrained devices: the gap between theory and practice
Group-signature schemes allow members within a predefined group to prove specific
properties without revealing more information than necessary. Potential areas of application …
properties without revealing more information than necessary. Potential areas of application …
Evaluation of anonymous digital signatures for privacy-enhancing mobile applications
Privacy-enhancing mobile applications that employ anonymous digital signature (ADS)
schemes can be beneficial for users who strongly concern about their privacy and security …
schemes can be beneficial for users who strongly concern about their privacy and security …
[PDF][PDF] Group Signatures with Linking-Based Revocation: A Pragmatic Approach for Efficient Revocation Checks.
Group signatures represent an important mechanism for privacy-preserving applications.
However, their practical applicability is restricted due to inefficiencies of existing …
However, their practical applicability is restricted due to inefficiencies of existing …
Protocoles de re-chiffrement pour le stockage de données
J Devigne - 2013 - hal.science
La protection de la vie privée est un des enjeux majeurs de la société moderne dans
laquelle Internet est omnipotent. Dans cette thèse, nous étudions des techniques permettant …
laquelle Internet est omnipotent. Dans cette thèse, nous étudions des techniques permettant …