Efficient protocols for set membership and range proofs
We consider the following problem: Given a commitment to a value σ, prove in zero-
knowledge that σ belongs to some discrete set Φ. The set Φ can perhaps be a list of cities or …
knowledge that σ belongs to some discrete set Φ. The set Φ can perhaps be a list of cities or …
Constant-Size Dynamic k-TAA
Abstract k-times anonymous authentication (k-TAA) schemes allow members of a group to
be authenticated anonymously by application providers for a bounded number of times …
be authenticated anonymously by application providers for a bounded number of times …
P-signatures and noninteractive anonymous credentials
In this paper, we introduce P-signatures. A P-signature scheme consists of a signature
scheme, a commitment scheme, and (1) an interactive protocol for obtaining a signature on …
scheme, a commitment scheme, and (1) an interactive protocol for obtaining a signature on …
Foundations of fully dynamic group signatures
Group signatures are a central cryptographic primitive that has received a considerable
amount of attention from the cryptographic community. They allow members of a group to …
amount of attention from the cryptographic community. They allow members of a group to …
Scalable group signatures with revocation
Group signatures are a central cryptographic primitive, simultaneously supporting
accountability and anonymity. They allow users to anonymously sign messages on behalf of …
accountability and anonymity. They allow users to anonymously sign messages on behalf of …
Revocable group signature schemes with constant costs for signing and verifying
T Nakanishi, H Fujii, Y Hira… - IEICE transactions on …, 2010 - search.ieice.org
Lots of revocable group signature schemes have been proposed so far. In one type of
revocable schemes, signing and/or verifying algorithms have O (N) or O (R) complexity …
revocable schemes, signing and/or verifying algorithms have O (N) or O (R) complexity …
Balancing privacy and accountability in blockchain identity management
The lack of privacy in the first generation of cryptocurrencies such as Bitcoin, Ethereum, etc.
is a well known problem in cryptocurrency research. To overcome this problem, several new …
is a well known problem in cryptocurrency research. To overcome this problem, several new …
3PAA: A private PUF protocol for anonymous authentication
Anonymous authentication (AA) schemes are used by an application provider to grant
services to its n users for pre-defined k times after they have authenticated themselves …
services to its n users for pre-defined k times after they have authenticated themselves …
Compact e-cash and simulatable VRFs revisited
Efficient non-interactive zero-knowledge proofs are a powerful tool for solving many
cryptographic problems. We apply the recent Groth-Sahai (GS) proof system for pairing …
cryptographic problems. We apply the recent Groth-Sahai (GS) proof system for pairing …
Constant-size dynamic k-times anonymous authentication
Dynamic k-times anonymous authentication (k-TAA) schemes allow members of a group to
be authenticated anonymously by application providers for a bounded number of times …
be authenticated anonymously by application providers for a bounded number of times …