Aggregate signatures with versatile randomization and issuer-hiding multi-authority anonymous credentials

O Mir, B Bauer, S Griffy, A Lysyanskaya… - Proceedings of the 2023 …, 2023 - dl.acm.org
Anonymous credentials (AC) offer privacy in user-centric identity management. They enable
users to authenticate anonymously, revealing only necessary attributes. With the rise of …

HARTS: High-threshold, adaptively secure, and robust threshold schnorr signatures

R Bacho, J Loss, G Stern, B Wagner - … on the Theory and Application of …, 2024 - Springer
Threshold variants of the Schnorr signature scheme have recently been at the center of
attention due to their applications to cryptocurrencies. However, existing constructions for …

Twinkle: Threshold signatures from DDH with full adaptive security

R Bacho, J Loss, S Tessaro, B Wagner… - … Conference on the Theory …, 2024 - Springer
Sparkle is the first threshold signature scheme in the pairing-free discrete logarithm setting
(Crites, Komlo, Maller, Crypto 2023) to be proven secure under adaptive corruptions …

Interactive threshold mercurial signatures and applications

M Abe, M Nanri, OP Kempner, M Tibouchi - International Conference on …, 2024 - Springer
Mercurial signatures are an extension of equivalence class signatures that allow malleability
for the public keys, messages, and signatures within the respective classes. Unfortunately …

[PDF][PDF] Fine-Grained Accountable Privacy via Unlinkable Policy-Compliant Signatures.

C Badertscher, M Sedaghat, H Waldner - IACR Cryptol. ePrint Arch., 2023 - core.ac.uk
Privacy-preserving payment systems face the difficult task of balancing privacy and
accountability: on one hand, users should be able to transact privately and anonymously, on …

Threshold Structure-Preserving Signatures: Strong and Adaptive Security Under Standard Assumptions

A Mitrokotsa, S Mukherjee, M Sedaghat… - … Conference on Public …, 2024 - Springer
Abstract Structure-preserving signatures (SPS) have emerged as an important cryptographic
building block, as their compatibility with the Groth-Sahai (GS) NIZK framework allows to …

Subset-optimized bls multi-signature with key aggregation

F Baldimtsi, KK Chalkias, F Garillot… - Cryptology ePrint …, 2023 - eprint.iacr.org
We propose a variant of the original Boneh, Drijvers, and Neven (Asiacrypt'18) BLS multi-
signature aggregation scheme best suited to applications where the full set of potential …

Unlinkable Policy-Compliant Signatures for Compliant and Decentralized Anonymous Payments

C Badertscher, M Sedaghat, H Waldner - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Privacy-preserving payment systems face the difficult task of balancing privacy and
accountability: on one hand, users should be able to transact privately and anonymously, on …

Cross-Domain Inner-Product Access Control Encryption for Secure EMR Flow in Cloud Edge

C Shi, Q Huang, R Jian, G Chi - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The quality of medical services is improved by sharing electronic medical records (EMRs)
across multiple medical institutions via cloud edge. However, EMRs contain private …

Interactive Threshold Mercurial Signatures and Applications

M Abe, M Nanri, OP Kempner, M Tibouchi - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Mercurial signatures are an extension of equivalence class signatures that allow malleability
for the public keys, messages, and signatures within the respective classes. Unfortunately …