Threshold cryptosystems from threshold fully homomorphic encryption

D Boneh, R Gennaro, S Goldfeder, A Jain… - Advances in Cryptology …, 2018 - Springer
We develop a general approach to adding a threshold functionality to a large class of (non-
threshold) cryptographic schemes. A threshold functionality enables a secret key to be split …

Two-Round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices

I Damgård, C Orlandi, A Takahashi, M Tibouchi - Journal of Cryptology, 2022 - Springer
Although they have been studied for a long time, distributed signature protocols have
garnered renewed interest in recent years in view of novel applications to topics like …

Post-quantum era privacy protection for intelligent infrastructures

L Malina, P Dzurenda, S Ricci, J Hajny… - IEEE …, 2021 - ieeexplore.ieee.org
As we move into a new decade, the global world of Intelligent Infrastructure (II) services
integrated into the Internet of Things (IoT) are at the forefront of technological advancements …

Post-quantum one-time linkable ring signature and application to ring confidential transactions in blockchain (lattice ringCT v1. 0)

WA Alberto Torres, R Steinfeld, A Sakzad… - Information Security and …, 2018 - Springer
In this paper, we construct a Lattice-based one-time Linkable Ring Signature (L2RS)
scheme, which enables the public to verify if two or more signatures were generated by …

An attack on some signature schemes constructed from five-pass identification schemes

D Kales, G Zaverucha - … Conference on Cryptology and Network Security, 2020 - Springer
We present a generic forgery attack on signature schemes constructed from 5-round
identification schemes made non-interactive with the Fiat-Shamir transform. The attack …

Lattice-Based Threshold Secret Sharing Scheme and Its Applications: A Survey

J Chen, H Deng, H Su, M Yuan, Y Ren - Electronics, 2024 - mdpi.com
As the most popular cryptographic scheme in the post-quantum field, lattices have received
extensive attention and research. Not only do they provide quantum-resistant security, they …

Efficient linkable and/or threshold ring signature without random oracles

TH Yuen, JK Liu, MH Au, W Susilo… - The Computer …, 2013 - ieeexplore.ieee.org
Linkable ring signatures have found many attractive applications. One of the recent
important extensions is a linkable threshold ring signature (LTRS) scheme. Unfortunately …

How to share a lattice trapdoor: threshold protocols for signatures and (H) IBE

R Bendlin, S Krehbiel, C Peikert - … , ACNS 2013, Banff, AB, Canada, June …, 2013 - Springer
We develop secure threshold protocols for two important operations in lattice cryptography,
namely, generating a hard lattice Λ together with a “strong” trapdoor, and sampling from a …

An efficient multivariate threshold ring signature scheme

DH Duong, HTN Tran, W Susilo - Computer Standards & Interfaces, 2021 - Elsevier
At CRYPTO 2011, Sakumoto et al. introduced the first 3-pass identification protocol with
security reduction to the MQ problem and impersonation probability 2 3. Petzoldt et …

A privacy-preserving framework for endorsement process in hyperledger fabric

J Dharani, K Sundarakantham, K Singh - Computers & Security, 2022 - Elsevier
Hyperledger Fabric is a permissioned flavor of blockchain which offers various privacy
features to its users. It stands out from other permissioned framework by allowing only a …