A survey on exotic signatures for post-quantum blockchain: Challenges and research directions

M Buser, R Dowsley, M Esgin, C Gritti… - ACM Computing …, 2023 - dl.acm.org
Blockchain technology provides efficient and secure solutions to various online activities by
utilizing a wide range of cryptographic tools. In this article, we survey the existing literature …

Progress in multivariate cryptography: Systematic review, challenges, and research directions

J Dey, R Dutta - ACM Computing Surveys, 2023 - dl.acm.org
Multivariate Public Key Cryptosystem (MPKC) seem to be promising toward future digital
security even in the presence of quantum adversaries. MPKCs derive their security from the …

Post-quantum era privacy protection for intelligent infrastructures

L Malina, P Dzurenda, S Ricci, J Hajny… - IEEE …, 2021 - ieeexplore.ieee.org
As we move into a new decade, the global world of Intelligent Infrastructure (II) services
integrated into the Internet of Things (IoT) are at the forefront of technological advancements …

CSI-otter: Isogeny-based (partially) blind signatures from the class group action with a twist

S Katsumata, YF Lai, JT LeGrow, L Qin - Designs, Codes and …, 2024 - Springer
In this paper, we construct the first provably-secure isogeny-based (partially) blind signature
scheme. While at a high level the scheme resembles the Schnorr blind signature, our work …

Practical, round-optimal lattice-based blind signatures

S Agrawal, E Kirshanova, D Stehlé… - Proceedings of the 2022 …, 2022 - dl.acm.org
Blind signatures are a fundamental cryptographic primitive with numerous practical
applications. While there exist many practical blind signatures from number-theoretic …

Critical perspectives on provable security: Fifteen years of" another look" papers

N Koblitz, A Menezes - Cryptology ePrint Archive, 2019 - eprint.iacr.org
Contents Page 1 CRITICAL PERSPECTIVES ON PROVABLE SECURITY: FIFTEEN YEARS OF
“ANOTHER LOOK” PAPERS NEAL KOBLITZ AND ALFRED MENEZES Abstract. We give an …

BLAZE: practical lattice-based blind signatures for privacy-preserving applications

N Alkeilani Alkadri, R El Bansarkhani… - … Conference on Financial …, 2020 - Springer
Blind signatures constitute basic cryptographic ingredients for privacy-preserving
applications such as anonymous credentials, e-voting, and Bitcoin. Despite the great variety …

A secure and efficient group signature scheme based on multivariate public key cryptography

N Kundu, SK Debnath, D Mishra - Journal of Information Security and …, 2021 - Elsevier
Group signatures are significant primitive for anonymity, which allow group members to sign
messages while hiding in the group, however, the signers remain accountable. Most of the …

Post-quantum key-blinding for authentication in anonymity networks

E Eaton, D Stebila, R Stracovsky - … , Bogotá, Colombia, October 6–8, 2021 …, 2021 - Springer
Anonymity networks, such as the Tor network, are highly decentralized and make heavy use
of ephemeral identities. Both of these characteristics run in direct opposition to a traditional …

[PDF][PDF] Can round-optimal lattice-based blind signatures be practical?

S Agrawal, E Kirshanova, D Stehle… - IACR Cryptol. ePrint …, 2021 - scholar.archive.org
Blind signatures have numerous applications in privacy-preserving technologies. While
there exist many practical blind signatures from number-theoretic assumptions, the situation …