2,348 Hits in 9.8 sec

Structure-Preserving Signatures on Equivalence Classes and Their Application to Anonymous Credentials [chapter]

Christian Hanser, Daniel Slamanig
2014 Lecture Notes in Computer Science  
Structure-Preserving Signature Scheme on Equivalence Classes: Inspired by randomizable signatures, we introduce a novel variant of structure-preserving signatures.  ...  Contribution This paper has three contributions: A novel type of structure-preserving signatures defined on equivalence classes on group element vectors, a novel randomizable polynomial commitment scheme  ...  We thank the anonymous referees and Georg Fuchsbauer for their helpful comments.  ... 
doi:10.1007/978-3-662-45611-8_26 fatcat:s4hwcekdevbfpaaylgdhp6264a

Structure-Preserving Signatures on Equivalence Classes and Constant-Size Anonymous Credentials

Georg Fuchsbauer, Christian Hanser, Daniel Slamanig
2018 Journal of Cryptology  
We introduce SPS on equivalence classes (SPS-EQ), which allow joint randomization of messages and signatures.  ...  Structure-preserving signatures (SPS) are a powerful building block for cryptographic protocols.  ...  Work done while the first author was at IST Austria and supported by the European Research Council, ERC Starting Grant (259668-PSPC).  ... 
doi:10.1007/s00145-018-9281-4 fatcat:yo4uxp4sb5aubiosnkp2fbvrja

Weakly Secure Equivalence-Class Signatures from Standard Assumptions [chapter]

Georg Fuchsbauer, Romain Gay
2018 Lecture Notes in Computer Science  
Structure-preserving signatures on equivalence classes, or equivalenceclass signatures (EQS) for short, allow similar applications to SPS.  ...  Structure-preserving signatures on equivalence classes, or equivalence-class signatures for short (EQS), are signature schemes defined over bilinear groups whose messages are vectors of group elements.  ...  We would like to thank the anonymous reviewers for their valuable comments that greatly helped to improve the paper. The first author is supported by the French ANR EfTrEC project (ANR-16-CE39-0002).  ... 
doi:10.1007/978-3-319-76581-5_6 fatcat:focajfokmjdprekbaj3g23ucjy

A New Approach to Efficient Revocable Attribute-Based Anonymous Credentials [chapter]

David Derler, Christian Hanser, Daniel Slamanig
2015 Lecture Notes in Computer Science  
Here, structure-preserving signatures on equivalence classes (SPS-EQ-R), a novel flavor of structure-preserving signatures (SPS), and randomizable polynomial commitments are elegantly combined to yield  ...  It has, however, been left open to present a full-fledged revocable multishow attribute-based anonymous credential (RABC) system based on the aforementioned paradigm.  ...  We would like to thank the anonymous reviewers for their valuable comments.  ... 
doi:10.1007/978-3-319-27239-9_4 fatcat:xfgh3gbkibfjnnqow2irbjupja

Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials [chapter]

Scott Coull, Matthew Green, Susan Hohenberger
2009 Lecture Notes in Computer Science  
As our primary application, we show how to construct privacy-preserving databases by combining oblivious transfer with an augmented anonymous credential system.  ...  are used for financial and defense applications.  ...  The Erratum to this chapter is available at DOI: 10.1007/978-3-642-00468-1_29 Acknowledgments The authors thank Zachary Crisler for helpful comments on a prior draft.  ... 
doi:10.1007/978-3-642-00468-1_28 fatcat:wbeduqf5t5havpoehbxtjgvaga

Malleable Signatures: New Definitions and Delegatable Anonymous Credentials

Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn
2014 2014 IEEE 27th Computer Security Foundations Symposium  
Finally, we construct delegatable anonymous credentials from signatures that are malleable with respect to an appropriate class of transformations (that we show our malleable signature supports).  ...  A signature scheme is malleable if, on input a message and a signature, it is possible to efficiently compute a signature on a related message, for a transformation that is allowed with respect to this  ...  ACKNOWLEDGMENTS Anna Lysyanskaya was supported by NSF grants 1012060, 0964379, 0831293, and by a Sloan Foundation fellowship, and Sarah Meiklejohn was supported in part by a MURI grant administered by  ... 
doi:10.1109/csf.2014.22 dblp:conf/csfw/ChaseKLM14 fatcat:oubti4jpubgqzaoe7evodrpzuq

Preventing Attacks on Anonymous Data Collection [article]

Alex Catarineu, Philipp Claßen, Konark Modi, Josep M. Pujol
2018 arXiv   pre-print
Anonymous data collection systems allow users to contribute the data necessary to build services and applications while preserving their privacy.  ...  Empirical evaluation yields performance up to 125 and 140 messages per second for senders and the collector respectively on nominal hardware.  ...  Unfortunately, when users are truly anonymous one cannot rely on defenses that are predicated on the ability to link records to their origin.  ... 
arXiv:1812.07927v1 fatcat:7wk4yw4ljzhddasv6kpgkmp7xe

Current and future privacy enhancing technologies for the internet

Yves Deswarte, Carlos Aguilar Melchor
2006 Annales des télécommunications  
Anonymous access to services will be the central point of the third category of PETS we consider.  ...  To complete this overview, we describe the current and future authorization pets, and finish by a presentation of personal data management.  ...  Acknowledgements The authors wish to thank the anonymous referees for careful reading and fruitful remarks on a previous version of this paper.  ... 
doi:10.1007/bf03219914 fatcat:6h24dvvqxzcujiydmgjz5aslam

Security Models and Requirements for Healthcare Application Clouds

Rui Zhang, Ling Liu
2010 2010 IEEE 3rd International Conference on Cloud Computing  
In this paper we discuss important concepts related to EHR sharing and integration in healthcare clouds and analyze the arising security and privacy issues in access and management of EHRs.  ...  Cloud computing paradigm is one of the popular healthIT infrastructure for facilitating EHR sharing and EHR integration.  ...  Acknowledgement: This work is partially supported by grants from NSF CISE NetSE program, NSF CISE CyberTrust program, and an IBM faculty award, an IBM SUR grant, and a grant from Intel Research Council  ... 
doi:10.1109/cloud.2010.62 dblp:conf/IEEEcloud/ZhangL10 fatcat:sls2jzqahbbv5mvtabmn76lle4

Cryptanalysis of the Structure-Preserving Signature Scheme on Equivalence Classes from Asiacrypt 2014 [chapter]

Yanbin Pan
2016 Lecture Notes in Computer Science  
At Asiacrypt 2014, Hanser and Slamanig presented a new cryptographic primitive called structure-preserving signature scheme on equivalence classes in the message space (G * 1 ) , where G1 is some additive  ...  Based on the signature scheme, they constructed an efficient multi-show attribute-based anonymous credential system that allows to encode an arbitrary number of attributes.  ...  We very thank the anonymous referees for their valuable suggestions on how to improve the presentation of this paper.  ... 
doi:10.1007/978-3-319-29485-8_17 fatcat:xegveciwhjdijfcsadot62zfva

I2PA: An Efficient ABC for IoT

Ibou Sene, Abdoul Aziz Ciss, Oumar Niang
2019 Cryptography  
However, it brings many challenges, mainly issues about privacy preservation and lightweight cryptography.  ...  In this paper, we propose an efficient attribute-based credential scheme for IoT devices. We use elliptic curve cryptography without pairing, blind signing, and zero-knowledge proof.  ...  The current infrastructure is based on centralized architecture, which allows no control of data by their owners; this is a threat to privacy preservation.  ... 
doi:10.3390/cryptography3020016 fatcat:ryhhygqp7bgupmpuozvmsdbzoy

Privacy-preserving solutions for Blockchain: review and challenges

Jorge Bernal Bernabe, Jose L. Canovas, Jose L. Hernandez-Ramos, Rafael Torres Moreno, Antonio Skarmeta
2019 IEEE Access  
To deal with these challenges, novel privacy-preserving solutions for blockchain based on crypto-privacy techniques are emerging to empower users with mechanisms to become anonymous and take control of  ...  In this sense, this paper performs a systematic review of the current state of the art on privacy-preserving research solutions and mechanisms in blockchain, as well as the main associated privacy challenges  ...  serial numbers. • ZKP based Anonymous Credential Systems on blockchain Another application of ZKP in the blockchain are the Anonymous Credential Systems (ACS) [39] .  ... 
doi:10.1109/access.2019.2950872 fatcat:kf2rl7onmrbvnozjudspxrcatu

Practical Round-Optimal Blind Signatures in the Standard Model [chapter]

Georg Fuchsbauer, Christian Hanser, Daniel Slamanig
2015 Lecture Notes in Computer Science  
We then show how to extend our construction to partially blind signatures and to blind signatures on message vectors, which yield a construction of one-show anonymous credentialsà la "anonymous credentials  ...  It is conceptually simple and builds on the recent structurepreserving signatures on equivalence classes (SPS-EQ) from Asiacrypt'14.  ...  Acknowledgements We would like to thank the anonymous reviewers of Crypto'15 for their valuable comments.  ... 
doi:10.1007/978-3-662-48000-7_12 fatcat:qkhhfijxavbalpg3f3nrp34sge

Leak-free group signatures with immediate revocation

X. Ding, G. Tsudik, S. Xu
2004 24th International Conference on Distributed Computing Systems, 2004. Proceedings.  
This work is motivated by attractive features of group signatures, particularly, their potential to serve as foundation for anonymous credential systems.  ...  Group signatures are an interesting and appealing cryptographic construct with many promising potential applications.  ...  One of the main purposes of group signatures is for an organization to conceal its internal structure.  ... 
doi:10.1109/icdcs.2004.1281628 dblp:conf/icdcs/DingTX04 fatcat:36s73yjsyzgw3jobzjyzjkzk2u

Mercurial Signatures for Variable-Length Messages

Elizabeth C. Crites, Anna Lysyanskaya
2021 Proceedings on Privacy Enhancing Technologies  
Mercurial signatures are a useful building block for privacy-preserving schemes, such as anonymous credentials, delegatable anonymous credentials, and related applications.  ...  They allow a signature σ on a message m under a public key pk to be transformed into a signature σ′ on an equivalent message m′ under an equivalent public key pk′ for an appropriate notion of equivalence  ...  Acknowledgements The first author was supported by EPSRC Grant EP/N028104/1 and NSF Grant 1422361. The second author was supported by NSF Grant 1422361.  ... 
doi:10.2478/popets-2021-0079 fatcat:72r74mbikvhdllhvz7uaaa4z34
« Previous Showing results 1 — 15 out of 2,348 results