A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Filters
Structure-Preserving Signatures on Equivalence Classes and Their Application to Anonymous Credentials
[chapter]
2014
Lecture Notes in Computer Science
Structure-Preserving Signature Scheme on Equivalence Classes: Inspired by randomizable signatures, we introduce a novel variant of structure-preserving signatures. ...
Contribution This paper has three contributions: A novel type of structure-preserving signatures defined on equivalence classes on group element vectors, a novel randomizable polynomial commitment scheme ...
We thank the anonymous referees and Georg Fuchsbauer for their helpful comments. ...
doi:10.1007/978-3-662-45611-8_26
fatcat:s4hwcekdevbfpaaylgdhp6264a
Structure-Preserving Signatures on Equivalence Classes and Constant-Size Anonymous Credentials
2018
Journal of Cryptology
We introduce SPS on equivalence classes (SPS-EQ), which allow joint randomization of messages and signatures. ...
Structure-preserving signatures (SPS) are a powerful building block for cryptographic protocols. ...
Work done while the first author was at IST Austria and supported by the European Research Council, ERC Starting Grant (259668-PSPC). ...
doi:10.1007/s00145-018-9281-4
fatcat:yo4uxp4sb5aubiosnkp2fbvrja
Weakly Secure Equivalence-Class Signatures from Standard Assumptions
[chapter]
2018
Lecture Notes in Computer Science
Structure-preserving signatures on equivalence classes, or equivalenceclass signatures (EQS) for short, allow similar applications to SPS. ...
Structure-preserving signatures on equivalence classes, or equivalence-class signatures for short (EQS), are signature schemes defined over bilinear groups whose messages are vectors of group elements. ...
We would like to thank the anonymous reviewers for their valuable comments that greatly helped to improve the paper. The first author is supported by the French ANR EfTrEC project (ANR-16-CE39-0002). ...
doi:10.1007/978-3-319-76581-5_6
fatcat:focajfokmjdprekbaj3g23ucjy
A New Approach to Efficient Revocable Attribute-Based Anonymous Credentials
[chapter]
2015
Lecture Notes in Computer Science
Here, structure-preserving signatures on equivalence classes (SPS-EQ-R), a novel flavor of structure-preserving signatures (SPS), and randomizable polynomial commitments are elegantly combined to yield ...
It has, however, been left open to present a full-fledged revocable multishow attribute-based anonymous credential (RABC) system based on the aforementioned paradigm. ...
We would like to thank the anonymous reviewers for their valuable comments. ...
doi:10.1007/978-3-319-27239-9_4
fatcat:xfgh3gbkibfjnnqow2irbjupja
Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials
[chapter]
2009
Lecture Notes in Computer Science
As our primary application, we show how to construct privacy-preserving databases by combining oblivious transfer with an augmented anonymous credential system. ...
are used for financial and defense applications. ...
The Erratum to this chapter is available at DOI: 10.1007/978-3-642-00468-1_29
Acknowledgments The authors thank Zachary Crisler for helpful comments on a prior draft. ...
doi:10.1007/978-3-642-00468-1_28
fatcat:wbeduqf5t5havpoehbxtjgvaga
Malleable Signatures: New Definitions and Delegatable Anonymous Credentials
2014
2014 IEEE 27th Computer Security Foundations Symposium
Finally, we construct delegatable anonymous credentials from signatures that are malleable with respect to an appropriate class of transformations (that we show our malleable signature supports). ...
A signature scheme is malleable if, on input a message and a signature, it is possible to efficiently compute a signature on a related message, for a transformation that is allowed with respect to this ...
ACKNOWLEDGMENTS Anna Lysyanskaya was supported by NSF grants 1012060, 0964379, 0831293, and by a Sloan Foundation fellowship, and Sarah Meiklejohn was supported in part by a MURI grant administered by ...
doi:10.1109/csf.2014.22
dblp:conf/csfw/ChaseKLM14
fatcat:oubti4jpubgqzaoe7evodrpzuq
Preventing Attacks on Anonymous Data Collection
[article]
2018
arXiv
pre-print
Anonymous data collection systems allow users to contribute the data necessary to build services and applications while preserving their privacy. ...
Empirical evaluation yields performance up to 125 and 140 messages per second for senders and the collector respectively on nominal hardware. ...
Unfortunately, when users are truly anonymous one cannot rely on defenses that are predicated on the ability to link records to their origin. ...
arXiv:1812.07927v1
fatcat:7wk4yw4ljzhddasv6kpgkmp7xe
Current and future privacy enhancing technologies for the internet
2006
Annales des télécommunications
Anonymous access to services will be the central point of the third category of PETS we consider. ...
To complete this overview, we describe the current and future authorization pets, and finish by a presentation of personal data management. ...
Acknowledgements The authors wish to thank the anonymous referees for careful reading and fruitful remarks on a previous version of this paper. ...
doi:10.1007/bf03219914
fatcat:6h24dvvqxzcujiydmgjz5aslam
Security Models and Requirements for Healthcare Application Clouds
2010
2010 IEEE 3rd International Conference on Cloud Computing
In this paper we discuss important concepts related to EHR sharing and integration in healthcare clouds and analyze the arising security and privacy issues in access and management of EHRs. ...
Cloud computing paradigm is one of the popular healthIT infrastructure for facilitating EHR sharing and EHR integration. ...
Acknowledgement: This work is partially supported by grants from NSF CISE NetSE program, NSF CISE CyberTrust program, and an IBM faculty award, an IBM SUR grant, and a grant from Intel Research Council ...
doi:10.1109/cloud.2010.62
dblp:conf/IEEEcloud/ZhangL10
fatcat:sls2jzqahbbv5mvtabmn76lle4
Cryptanalysis of the Structure-Preserving Signature Scheme on Equivalence Classes from Asiacrypt 2014
[chapter]
2016
Lecture Notes in Computer Science
At Asiacrypt 2014, Hanser and Slamanig presented a new cryptographic primitive called structure-preserving signature scheme on equivalence classes in the message space (G * 1 ) , where G1 is some additive ...
Based on the signature scheme, they constructed an efficient multi-show attribute-based anonymous credential system that allows to encode an arbitrary number of attributes. ...
We very thank the anonymous referees for their valuable suggestions on how to improve the presentation of this paper. ...
doi:10.1007/978-3-319-29485-8_17
fatcat:xegveciwhjdijfcsadot62zfva
I2PA: An Efficient ABC for IoT
2019
Cryptography
However, it brings many challenges, mainly issues about privacy preservation and lightweight cryptography. ...
In this paper, we propose an efficient attribute-based credential scheme for IoT devices. We use elliptic curve cryptography without pairing, blind signing, and zero-knowledge proof. ...
The current infrastructure is based on centralized architecture, which allows no control of data by their owners; this is a threat to privacy preservation. ...
doi:10.3390/cryptography3020016
fatcat:ryhhygqp7bgupmpuozvmsdbzoy
Privacy-preserving solutions for Blockchain: review and challenges
2019
IEEE Access
To deal with these challenges, novel privacy-preserving solutions for blockchain based on crypto-privacy techniques are emerging to empower users with mechanisms to become anonymous and take control of ...
In this sense, this paper performs a systematic review of the current state of the art on privacy-preserving research solutions and mechanisms in blockchain, as well as the main associated privacy challenges ...
serial numbers. • ZKP based Anonymous Credential Systems on blockchain Another application of ZKP in the blockchain are the Anonymous Credential Systems (ACS) [39] . ...
doi:10.1109/access.2019.2950872
fatcat:kf2rl7onmrbvnozjudspxrcatu
Practical Round-Optimal Blind Signatures in the Standard Model
[chapter]
2015
Lecture Notes in Computer Science
We then show how to extend our construction to partially blind signatures and to blind signatures on message vectors, which yield a construction of one-show anonymous credentialsà la "anonymous credentials ...
It is conceptually simple and builds on the recent structurepreserving signatures on equivalence classes (SPS-EQ) from Asiacrypt'14. ...
Acknowledgements We would like to thank the anonymous reviewers of Crypto'15 for their valuable comments. ...
doi:10.1007/978-3-662-48000-7_12
fatcat:qkhhfijxavbalpg3f3nrp34sge
Leak-free group signatures with immediate revocation
2004
24th International Conference on Distributed Computing Systems, 2004. Proceedings.
This work is motivated by attractive features of group signatures, particularly, their potential to serve as foundation for anonymous credential systems. ...
Group signatures are an interesting and appealing cryptographic construct with many promising potential applications. ...
One of the main purposes of group signatures is for an organization to conceal its internal structure. ...
doi:10.1109/icdcs.2004.1281628
dblp:conf/icdcs/DingTX04
fatcat:36s73yjsyzgw3jobzjyzjkzk2u
Mercurial Signatures for Variable-Length Messages
2021
Proceedings on Privacy Enhancing Technologies
Mercurial signatures are a useful building block for privacy-preserving schemes, such as anonymous credentials, delegatable anonymous credentials, and related applications. ...
They allow a signature σ on a message m under a public key pk to be transformed into a signature σ′ on an equivalent message m′ under an equivalent public key pk′ for an appropriate notion of equivalence ...
Acknowledgements The first author was supported by EPSRC Grant EP/N028104/1 and NSF Grant 1422361. The second author was supported by NSF Grant 1422361. ...
doi:10.2478/popets-2021-0079
fatcat:72r74mbikvhdllhvz7uaaa4z34
« Previous
Showing results 1 — 15 out of 2,348 results