A survey on exotic signatures for post-quantum blockchain: Challenges and research directions
Blockchain technology provides efficient and secure solutions to various online activities by
utilizing a wide range of cryptographic tools. In this article, we survey the existing literature …
utilizing a wide range of cryptographic tools. In this article, we survey the existing literature …
Progress in multivariate cryptography: Systematic review, challenges, and research directions
J Dey, R Dutta - ACM Computing Surveys, 2023 - dl.acm.org
Multivariate Public Key Cryptosystem (MPKC) seem to be promising toward future digital
security even in the presence of quantum adversaries. MPKCs derive their security from the …
security even in the presence of quantum adversaries. MPKCs derive their security from the …
Post-quantum era privacy protection for intelligent infrastructures
As we move into a new decade, the global world of Intelligent Infrastructure (II) services
integrated into the Internet of Things (IoT) are at the forefront of technological advancements …
integrated into the Internet of Things (IoT) are at the forefront of technological advancements …
CSI-otter: Isogeny-based (partially) blind signatures from the class group action with a twist
In this paper, we construct the first provably-secure isogeny-based (partially) blind signature
scheme. While at a high level the scheme resembles the Schnorr blind signature, our work …
scheme. While at a high level the scheme resembles the Schnorr blind signature, our work …
Practical, round-optimal lattice-based blind signatures
Blind signatures are a fundamental cryptographic primitive with numerous practical
applications. While there exist many practical blind signatures from number-theoretic …
applications. While there exist many practical blind signatures from number-theoretic …
Critical perspectives on provable security: Fifteen years of" another look" papers
Contents Page 1 CRITICAL PERSPECTIVES ON PROVABLE SECURITY: FIFTEEN YEARS OF
“ANOTHER LOOK” PAPERS NEAL KOBLITZ AND ALFRED MENEZES Abstract. We give an …
“ANOTHER LOOK” PAPERS NEAL KOBLITZ AND ALFRED MENEZES Abstract. We give an …
BLAZE: practical lattice-based blind signatures for privacy-preserving applications
N Alkeilani Alkadri, R El Bansarkhani… - … Conference on Financial …, 2020 - Springer
Blind signatures constitute basic cryptographic ingredients for privacy-preserving
applications such as anonymous credentials, e-voting, and Bitcoin. Despite the great variety …
applications such as anonymous credentials, e-voting, and Bitcoin. Despite the great variety …
A secure and efficient group signature scheme based on multivariate public key cryptography
Group signatures are significant primitive for anonymity, which allow group members to sign
messages while hiding in the group, however, the signers remain accountable. Most of the …
messages while hiding in the group, however, the signers remain accountable. Most of the …
Post-quantum key-blinding for authentication in anonymity networks
Anonymity networks, such as the Tor network, are highly decentralized and make heavy use
of ephemeral identities. Both of these characteristics run in direct opposition to a traditional …
of ephemeral identities. Both of these characteristics run in direct opposition to a traditional …
[PDF][PDF] Can round-optimal lattice-based blind signatures be practical?
Blind signatures have numerous applications in privacy-preserving technologies. While
there exist many practical blind signatures from number-theoretic assumptions, the situation …
there exist many practical blind signatures from number-theoretic assumptions, the situation …