Known constructions of blind signature schemes suffer from at least one of the following limitations: (1) rely on parties having access to a common reference string or a random oracle, (2) are not round-optimal, or (3) are prohibitively expensive. In this work, we construct the first blind-signature scheme that does not suffer from any of these limitations. In other words, besides being round optimal and having a standard model proof of security, our scheme is very efficient. Specifically, in our scheme, one signature is of size 6.5 KB and the communication complexity of the signing protocol is roughly 100 KB. An amortized variant of our scheme has communication complexity less that 1 KB
International audienceAt Crypto'15 Fuchsbauer, Hanser and Slamanig (FHS) presented the first standar...
International audienceAt Crypto'15 Fuchsbauer, Hanser and Slamanig (FHS) presented the first standar...
Abstract—A blind signature is a very important technology in e-commerce. This paper uses an ideal ci...
Known constructions of blind signature schemes suffer from at least one of the following limitations...
Round-optimal blind signatures are notoriously hard to construct in the stan-dard model, especially ...
Round-optimal blind signatures are notoriously hard to construct in the standard model, especially i...
We propose a 2-round blind signature protocol based on the random oracle heuristic and the hardness ...
Blind signatures are a fundamental tool for privacy-preserving applications. Known constructions of ...
Blind signature schemes provide the functionality of a carbon copy envelope: The user (receiver) put...
Blind signature schemes provide the functionality of a carbon copy envelope: The user (receiver) put...
Round-optimal blind signatures are notoriously hard to construct in the standard model, especially i...
Blind signatures serve as a foundational tool for privacy-preserving applications and have recently ...
International audiencePartially-blind signatures find many applications in the area of anonymity, su...
Existing blind signature schemes that are secure for poly- nomially many concurrent executions of th...
Blind Signatures are a useful primitive for privacy preserving applications such as electronic payme...
International audienceAt Crypto'15 Fuchsbauer, Hanser and Slamanig (FHS) presented the first standar...
International audienceAt Crypto'15 Fuchsbauer, Hanser and Slamanig (FHS) presented the first standar...
Abstract—A blind signature is a very important technology in e-commerce. This paper uses an ideal ci...
Known constructions of blind signature schemes suffer from at least one of the following limitations...
Round-optimal blind signatures are notoriously hard to construct in the stan-dard model, especially ...
Round-optimal blind signatures are notoriously hard to construct in the standard model, especially i...
We propose a 2-round blind signature protocol based on the random oracle heuristic and the hardness ...
Blind signatures are a fundamental tool for privacy-preserving applications. Known constructions of ...
Blind signature schemes provide the functionality of a carbon copy envelope: The user (receiver) put...
Blind signature schemes provide the functionality of a carbon copy envelope: The user (receiver) put...
Round-optimal blind signatures are notoriously hard to construct in the standard model, especially i...
Blind signatures serve as a foundational tool for privacy-preserving applications and have recently ...
International audiencePartially-blind signatures find many applications in the area of anonymity, su...
Existing blind signature schemes that are secure for poly- nomially many concurrent executions of th...
Blind Signatures are a useful primitive for privacy preserving applications such as electronic payme...
International audienceAt Crypto'15 Fuchsbauer, Hanser and Slamanig (FHS) presented the first standar...
International audienceAt Crypto'15 Fuchsbauer, Hanser and Slamanig (FHS) presented the first standar...
Abstract—A blind signature is a very important technology in e-commerce. This paper uses an ideal ci...