Security of the Fiat-Shamir transformation in the quantum random-oracle model

J Don, S Fehr, C Majenz, C Schaffner - … Barbara, CA, USA, August 18–22 …, 2019 - Springer
Abstract The famous Fiat-Shamir transformation turns any public-coin three-round interactive
proof, ie, any so-called Σ-protocol, into a non-interactive proof in the random-oracle model …

A Compressed -Protocol Theory for Lattices

T Attema, R Cramer, L Kohl - Annual International Cryptology Conference, 2021 - Springer
We show a lattice-based solution for commit-and-prove transparent circuit zero-knowledge
(ZK) with polylog-communication, the first not depending on PCPs. We start from …

Online-extractability in the quantum random-oracle model

J Don, S Fehr, C Majenz, C Schaffner - … on the Theory and Applications of …, 2022 - Springer
We show the following generic result: When a quantum query algorithm in the quantum
random-oracle model outputs a classical value t that is promised to be in some tight relation …

A new framework for more efficient round-optimal lattice-based (partially) blind signature via trapdoor sampling

R del Pino, S Katsumata - Annual International Cryptology Conference, 2022 - Springer
Blind signatures, proposed by Chaum (CRYPTO'82), are interactive protocols between a
signer and a user, where a user can obtain a signature without revealing the message to be …

Spartan and bulletproofs are simulation-extractable (for free!)

Q Dao, P Grubbs - Annual International Conference on the Theory and …, 2023 - Springer
Increasing deployment of advanced zero-knowledge proof systems, especially zkSNARKs,
has raised critical questions about their security against real-world attacks. Two classes of …

A non-PCP approach to succinct quantum-safe zero-knowledge

J Bootle, V Lyubashevsky, NK Nguyen… - Annual International …, 2020 - Springer
Today's most compact zero-knowledge arguments are based on the hardness of the discrete
logarithm problem and related classical assumptions. If one is interested in quantum-safe …

Shorter signatures based on tailor-made minimalist symmetric-key crypto

C Dobraunig, D Kales, C Rechberger… - Proceedings of the …, 2022 - dl.acm.org
Signature schemes based on the MPC-in-the-head approach (MPCitH) have either been
designed by taking a proof system and selecting a suitable symmetric-key primitive (Picnic …

SMILE: set membership from ideal lattices with applications to ring signatures and confidential transactions

V Lyubashevsky, NK Nguyen, G Seiler - Annual International Cryptology …, 2021 - Springer
In a set membership proof, the public information consists of a set of elements and a
commitment. The prover then produces a zero-knowledge proof showing that the …

Banquet: Short and fast signatures from AES

C Baum, CD de Saint Guilhem, D Kales… - … Conference on Public …, 2021 - Springer
This work introduces Banquet, a digital signature scheme with post-quantum security,
constructed using only symmetric-key primitives. The design is based on the MPC-in-head …

Securing the future: exploring post-quantum cryptography for authentication and user privacy in IoT devices

K Mansoor, M Afzal, W Iqbal, Y Abbas - Cluster Computing, 2025 - Springer
With the emergence of quantum computers, traditional cryptographic methods are
vulnerable to attacks, emphasizing the need for post-quantum cryptography to secure …