Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey

N Kaaniche, M Laurent, S Belguith - Journal of Network and Computer …, 2020 - Elsevier
Personal data are often collected and processed in a decentralized fashion, within different
contexts. For instance, with the emergence of distributed applications, several providers are …

Signature schemes with efficient protocols and dynamic group signatures from lattice assumptions

B Libert, S Ling, F Mouhartem, K Nguyen… - … Conference on the …, 2016 - Springer
A recent line of works–initiated by Gordon, Katz and Vaikuntanathan (Asiacrypt 2010)–gave
lattice-based constructions allowing users to authenticate while remaining hidden in a …

Threshold bbs+ signatures for distributed anonymous credential issuance

J Doerner, Y Kondi, E Lee, A Shelat… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
We propose a secure multiparty signing protocol for the BBS+ signature scheme; in other
words, an anonymous credential scheme with threshold issuance. We prove that due to the …

Structure-preserving signatures on equivalence classes and constant-size anonymous credentials

G Fuchsbauer, C Hanser, D Slamanig - Journal of Cryptology, 2019 - Springer
Abstract Structure-preserving signatures (SPS) are a powerful building block for
cryptographic protocols. We introduce SPS on equivalence classes (SPS-EQ), which allow …

Accumulators with applications to anonymity-preserving revocation

F Baldimtsi, J Camenisch… - 2017 IEEE European …, 2017 - ieeexplore.ieee.org
Membership revocation is essential for cryptographic applications, from traditional PKIs to
group signatures and anonymous credentials. Of the various solutions for the revocation …

Composable and modular anonymous credentials: Definitions and practical constructions

J Camenisch, M Dubovitskaya, K Haralambiev… - Advances in Cryptology …, 2015 - Springer
It takes time for theoretical advances to get used in practical schemes. Anonymous
credential schemes are no exception. For instance, existing schemes suited for real-world …

Issuer-hiding attribute-based credentials

J Bobolz, F Eidens, S Krenn, S Ramacher… - Cryptology and Network …, 2021 - Springer
Attribute-based credential systems enable users to authenticate in a privacy-preserving
manner. However, in such schemes verifying a user's credential requires knowledge of the …

Efficient zero-knowledge proofs for commitments from learning with errors over rings

F Benhamouda, S Krenn, V Lyubashevsky… - … symposium on research …, 2015 - Springer
We extend a commitment scheme based on the learning with errors over rings (RLWE
RLWE) problem, and present efficient companion zero-knowledge proofs of knowledge. Our …

Lift-and-shift: obtaining simulation extractable subversion and updatable SNARKs generically

B Abdolmaleki, S Ramacher, D Slamanig - Proceedings of the 2020 …, 2020 - dl.acm.org
Zero-knowledge proofs and in particular succinct non-interactive zero-knowledge proofs (so
called zk-SNARKs) are getting increasingly used in real-world applications, with …

Delegatable anonymous credentials from mercurial signatures

EC Crites, A Lysyanskaya - Cryptographers' Track at the RSA Conference, 2019 - Springer
In a delegatable anonymous credential system, participants may use their credentials
anonymously as well as anonymously delegate them to other participants. Such systems are …