Improved constructions of anonymous credentials from structure-preserving signatures on equivalence classes
Anonymous attribute-based credentials (ABCs) are a powerful tool allowing users to
authenticate while maintaining privacy. When instantiated from structure-preserving …
authenticate while maintaining privacy. When instantiated from structure-preserving …
Threshold structure-preserving signatures
Abstract Structure-preserving signatures (SPS) are an important building block for privacy-
preserving cryptographic primitives, such as electronic cash, anonymous credentials, and …
preserving cryptographic primitives, such as electronic cash, anonymous credentials, and …
Shorter non-interactive zero-knowledge arguments and ZAPs for algebraic languages
G Couteau, D Hartmann - Annual International Cryptology Conference, 2020 - Springer
We put forth a new framework for building pairing-based non-interactive zero-knowledge
(NIZK) arguments for a wide class of algebraic languages, which are an extension of linear …
(NIZK) arguments for a wide class of algebraic languages, which are an extension of linear …
Hierarchical identity-based encryption with tight multi-challenge security
We construct the first hierarchical identity-based encryption (HIBE) scheme with tight
adaptive security in the multi-challenge setting, where adversaries are allowed to ask for …
adaptive security in the multi-challenge setting, where adversaries are allowed to ask for …
Compact structure-preserving signatures with almost tight security
In structure-preserving cryptography, every building block shares the same bilinear groups.
These groups must be generated for a specific, a priori fixed security level, and thus it is vital …
These groups must be generated for a specific, a priori fixed security level, and thus it is vital …
Almost tight multi-user security under adaptive corruptions & leakages in the standard model
In this paper, we consider tight multi-user security under adaptive corruptions, where the
adversary can adaptively corrupt some users and obtain their secret keys. We propose …
adversary can adaptively corrupt some users and obtain their secret keys. We propose …
Unbounded HIBE with tight security
We propose the first tightly secure and unbounded hierarchical identity-based encryption
(HIBE) scheme based on standard assumptions. Our main technical contribution is a novel …
(HIBE) scheme based on standard assumptions. Our main technical contribution is a novel …
Threshold Structure-Preserving Signatures: Strong and Adaptive Security Under Standard Assumptions
Abstract Structure-preserving signatures (SPS) have emerged as an important cryptographic
building block, as their compatibility with the Groth-Sahai (GS) NIZK framework allows to …
building block, as their compatibility with the Groth-Sahai (GS) NIZK framework allows to …
Tight leakage-resilient identity-based encryption under multi-challenge setting
In this work, we present the first leakage-resilient identity-based encryption (LR-IBE) scheme
that features (almost) tight security under the multi-challenge setting, in which the adversary …
that features (almost) tight security under the multi-challenge setting, in which the adversary …
Optimal tightness for chain-based unique signatures
Unique signatures are digital signatures with exactly one unique and valid signature for
each message. The security reduction for most unique signatures has a natural reduction …
each message. The security reduction for most unique signatures has a natural reduction …