Improved constructions of anonymous credentials from structure-preserving signatures on equivalence classes

A Connolly, P Lafourcade, O Perez Kempner - … Conference on Public-Key …, 2022 - Springer
Anonymous attribute-based credentials (ABCs) are a powerful tool allowing users to
authenticate while maintaining privacy. When instantiated from structure-preserving …

Threshold structure-preserving signatures

E Crites, M Kohlweiss, B Preneel, M Sedaghat… - … Conference on the …, 2023 - Springer
Abstract Structure-preserving signatures (SPS) are an important building block for privacy-
preserving cryptographic primitives, such as electronic cash, anonymous credentials, and …

Shorter non-interactive zero-knowledge arguments and ZAPs for algebraic languages

G Couteau, D Hartmann - Annual International Cryptology Conference, 2020 - Springer
We put forth a new framework for building pairing-based non-interactive zero-knowledge
(NIZK) arguments for a wide class of algebraic languages, which are an extension of linear …

Hierarchical identity-based encryption with tight multi-challenge security

R Langrehr, J Pan - Public-Key Cryptography–PKC 2020: 23rd IACR …, 2020 - Springer
We construct the first hierarchical identity-based encryption (HIBE) scheme with tight
adaptive security in the multi-challenge setting, where adversaries are allowed to ask for …

Compact structure-preserving signatures with almost tight security

M Abe, D Hofheinz, R Nishimaki, M Ohkubo… - Advances in Cryptology …, 2017 - Springer
In structure-preserving cryptography, every building block shares the same bilinear groups.
These groups must be generated for a specific, a priori fixed security level, and thus it is vital …

Almost tight multi-user security under adaptive corruptions & leakages in the standard model

S Han, S Liu, D Gu - Annual International Conference on the Theory and …, 2023 - Springer
In this paper, we consider tight multi-user security under adaptive corruptions, where the
adversary can adaptively corrupt some users and obtain their secret keys. We propose …

Unbounded HIBE with tight security

R Langrehr, J Pan - Advances in Cryptology–ASIACRYPT 2020: 26th …, 2020 - Springer
We propose the first tightly secure and unbounded hierarchical identity-based encryption
(HIBE) scheme based on standard assumptions. Our main technical contribution is a novel …

Threshold Structure-Preserving Signatures: Strong and Adaptive Security Under Standard Assumptions

A Mitrokotsa, S Mukherjee, M Sedaghat… - … Conference on Public …, 2024 - Springer
Abstract Structure-preserving signatures (SPS) have emerged as an important cryptographic
building block, as their compatibility with the Groth-Sahai (GS) NIZK framework allows to …

Tight leakage-resilient identity-based encryption under multi-challenge setting

C Cai, X Qin, TH Yuen, SM Yiu - Proceedings of the 2022 ACM on Asia …, 2022 - dl.acm.org
In this work, we present the first leakage-resilient identity-based encryption (LR-IBE) scheme
that features (almost) tight security under the multi-challenge setting, in which the adversary …

Optimal tightness for chain-based unique signatures

F Guo, W Susilo - Annual International Conference on the Theory and …, 2022 - Springer
Unique signatures are digital signatures with exactly one unique and valid signature for
each message. The security reduction for most unique signatures has a natural reduction …