Abstract. Verifiably encrypted signature schemes (VES) allow a signer to encrypt his or her signature under the public key of a trusted third party, while maintaining public signature verifiability. With our work, we propose two generic constructions based on Merkle authentication trees that do not require non-interactive zero-knowledge proofs (NIZKs) for maintaining verifiability. Both are stateful and secure in the stan-dard model. Furthermore, we extend the specification for VES, bringing it closer to real-world needs. We also argue that statefulness can be a feature in common business scenarios. Our constructions rely on the assumption that CPA (even slightly weaker) secure encryption, “maskable ” CMA secure signatures, and collision re...
Abstract. We propose a variant of the “bonsai tree ” signature scheme, a lattice-based existentially...
n structure-preserving signatures on equivalence classes (SPS-EQ-R), introduced at ASIACRYPT 2014, e...
International audienceRandomizable encryption allows anyone to transform a ciphertext into a fresh c...
We give a new framework for obtaining signatures with a tight security reduction from standard hardn...
We show how to construct an existentially unforgeable secure signature scheme from any scheme satisf...
Abstract. Verifiably encrypted signatures (VES) are signatures encrypted by a public key of a truste...
Abstract. For controlling the public verifiability of ordinary digital sig-natures, designated confi...
Verifiably encrypted signature is a extended signature type and plays an important role in the const...
A verifiably encrypted signature can convince the verifier that a given cipher-text is the encryptio...
Abstract. Verifiably encrypted signatures were introduced by Boneh, Gentry, Lynn, and Shacham in 200...
We generalise and improve the security and efficiency of the verifiable encryption scheme of Asokan ...
Abstract. Formal methods have been extensively applied to the certification of cryptographic protoco...
Abstract. We present the first signature scheme which is “short”, state-less and secure under the RS...
Privacy and control over data have become a public concern. Simultaneously, the increasing likelihoo...
Aggregate signatures provide bandwidth-saving aggregation of ordinary signatures. We present the fir...
Abstract. We propose a variant of the “bonsai tree ” signature scheme, a lattice-based existentially...
n structure-preserving signatures on equivalence classes (SPS-EQ-R), introduced at ASIACRYPT 2014, e...
International audienceRandomizable encryption allows anyone to transform a ciphertext into a fresh c...
We give a new framework for obtaining signatures with a tight security reduction from standard hardn...
We show how to construct an existentially unforgeable secure signature scheme from any scheme satisf...
Abstract. Verifiably encrypted signatures (VES) are signatures encrypted by a public key of a truste...
Abstract. For controlling the public verifiability of ordinary digital sig-natures, designated confi...
Verifiably encrypted signature is a extended signature type and plays an important role in the const...
A verifiably encrypted signature can convince the verifier that a given cipher-text is the encryptio...
Abstract. Verifiably encrypted signatures were introduced by Boneh, Gentry, Lynn, and Shacham in 200...
We generalise and improve the security and efficiency of the verifiable encryption scheme of Asokan ...
Abstract. Formal methods have been extensively applied to the certification of cryptographic protoco...
Abstract. We present the first signature scheme which is “short”, state-less and secure under the RS...
Privacy and control over data have become a public concern. Simultaneously, the increasing likelihoo...
Aggregate signatures provide bandwidth-saving aggregation of ordinary signatures. We present the fir...
Abstract. We propose a variant of the “bonsai tree ” signature scheme, a lattice-based existentially...
n structure-preserving signatures on equivalence classes (SPS-EQ-R), introduced at ASIACRYPT 2014, e...
International audienceRandomizable encryption allows anyone to transform a ciphertext into a fresh c...