On instantiating unleveled fully-homomorphic signatures from falsifiable assumptions

R Gay, B Ursu - IACR International Conference on Public-Key …, 2024 - Springer
We build the first unleveled fully homomorphic signature scheme in the standard model. Our
scheme is not constrained by any a-priori bound on the depth of the functions that can be …

Bifurcated signatures: folding the accountability vs. anonymity dilemma into a single private signing scheme

B Libert, K Nguyen, T Peters, M Yung - … on the Theory and Applications of …, 2021 - Springer
Over the development of modern cryptography, often, alternative cryptographic schemes are
developed to achieve goals that in some important respect are orthogonal. Thus, we have to …

On instantiating the algebraic group model from falsifiable assumptions

T Agrikola, D Hofheinz, J Kastner - … on the Theory and Applications of …, 2020 - Springer
We provide a standard-model implementation (of a relaxation) of the algebraic group model
(AGM,[Fuchsbauer, Kiltz, Loss, CRYPTO 2018]). Specifically, we show that every algorithm …

FgDAP: A blockchain-based privacy-enhanced decentralized anonymous payment system with fine-grained traceability

Y Wang - Computers and Electrical Engineering, 2024 - Elsevier
Abstract Decentralized Anonymous Payment (DAP) frameworks provide users with the
capability to securely and privately transfer cryptocurrencies. These frameworks enable …

New constructions of statistical NIZKs: dual-mode DV-NIZKs and more

B Libert, A Passelègue, H Wee, DJ Wu - … on the Theory and Applications of …, 2020 - Springer
Non-interactive zero-knowledge proofs (NIZKs) are important primitives in cryptography. A
major challenge since the early works on NIZKs has been to construct NIZKs with a …

On Quantum Simulation-Soundness

B Abdolmaleki, C Chevalier, E Ebrahimi… - Cryptology ePrint …, 2023 - eprint.iacr.org
Non-interactive zero-knowledge (NIZK) proof systems are a cornerstone of modern
cryptography, but their security has received little attention in the quantum settings …

Correlation-intractable hash functions via shift-hiding

A Lombardi, V Vaikuntanathan - Cryptology ePrint Archive, 2020 - eprint.iacr.org
A hash function family $\mathcal {H} $ is correlation intractable for a $ t $-input relation
$\mathcal {R} $ if, given a random function $ h $ chosen from $\mathcal {H} $, it is hard to …

[PDF][PDF] On Foundations of Protecting Computations

T Agrikola - 2021 - core.ac.uk
Information technology systems have become indispensable to uphold our way of living, our
economy and our safety. Failure of these systems can have devastating effects …

[PDF][PDF] Multi-Input Correlation-Intractable Hash Functions via Shift-Hiding.

A Lombardi, V Vaikuntanathan - IACR Cryptol. ePrint Arch., 2020 - iacr.steepath.eu
A hash function family H is correlation intractable for a t-input relation R if, given a random
function h chosen from H, it is hard to find x1,..., xt such that R (x1,..., xt, h (x1),..., h (xt)) is …

On Abstract Models in Cryptography and Their Applications

J Kastner - 2024 - research-collection.ethz.ch
When talking about the security of a cryptographic scheme, researchers often model it as a
game between a challenger and an adversary. Such a game gives a clear description of the …