Aggregate signatures with versatile randomization and issuer-hiding multi-authority anonymous credentials
Anonymous credentials (AC) offer privacy in user-centric identity management. They enable
users to authenticate anonymously, revealing only necessary attributes. With the rise of …
users to authenticate anonymously, revealing only necessary attributes. With the rise of …
HARTS: High-threshold, adaptively secure, and robust threshold schnorr signatures
Threshold variants of the Schnorr signature scheme have recently been at the center of
attention due to their applications to cryptocurrencies. However, existing constructions for …
attention due to their applications to cryptocurrencies. However, existing constructions for …
Twinkle: Threshold signatures from DDH with full adaptive security
Sparkle is the first threshold signature scheme in the pairing-free discrete logarithm setting
(Crites, Komlo, Maller, Crypto 2023) to be proven secure under adaptive corruptions …
(Crites, Komlo, Maller, Crypto 2023) to be proven secure under adaptive corruptions …
Interactive threshold mercurial signatures and applications
Mercurial signatures are an extension of equivalence class signatures that allow malleability
for the public keys, messages, and signatures within the respective classes. Unfortunately …
for the public keys, messages, and signatures within the respective classes. Unfortunately …
[PDF][PDF] Fine-Grained Accountable Privacy via Unlinkable Policy-Compliant Signatures.
Privacy-preserving payment systems face the difficult task of balancing privacy and
accountability: on one hand, users should be able to transact privately and anonymously, on …
accountability: on one hand, users should be able to transact privately and anonymously, on …
Threshold Structure-Preserving Signatures: Strong and Adaptive Security Under Standard Assumptions
Abstract Structure-preserving signatures (SPS) have emerged as an important cryptographic
building block, as their compatibility with the Groth-Sahai (GS) NIZK framework allows to …
building block, as their compatibility with the Groth-Sahai (GS) NIZK framework allows to …
Subset-optimized bls multi-signature with key aggregation
We propose a variant of the original Boneh, Drijvers, and Neven (Asiacrypt'18) BLS multi-
signature aggregation scheme best suited to applications where the full set of potential …
signature aggregation scheme best suited to applications where the full set of potential …
Unlinkable Policy-Compliant Signatures for Compliant and Decentralized Anonymous Payments
Privacy-preserving payment systems face the difficult task of balancing privacy and
accountability: on one hand, users should be able to transact privately and anonymously, on …
accountability: on one hand, users should be able to transact privately and anonymously, on …
Cross-Domain Inner-Product Access Control Encryption for Secure EMR Flow in Cloud Edge
C Shi, Q Huang, R Jian, G Chi - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The quality of medical services is improved by sharing electronic medical records (EMRs)
across multiple medical institutions via cloud edge. However, EMRs contain private …
across multiple medical institutions via cloud edge. However, EMRs contain private …
Interactive Threshold Mercurial Signatures and Applications
Mercurial signatures are an extension of equivalence class signatures that allow malleability
for the public keys, messages, and signatures within the respective classes. Unfortunately …
for the public keys, messages, and signatures within the respective classes. Unfortunately …