International audienceStructure-preserving signatures (SPS) are a powerful building block for cryptographic protocols. We introduce SPS on equivalence classes (SPS-EQ), which allow joint randomization of messages and signatures. Messages are projective equivalence classes defined on group-element vectors, so multiplying a vector by a scalar yields a different representative of the same class. Our scheme lets one adapt a signature for one representative to a signature for another representative without knowledge of any secret. Moreover, given a signature, an adapted signature for a different representative is indistinguishable from a fresh signature on a random message. We propose a definitional framework for SPS-EQ and an efficient construc...
We present a framework for building practical anonymous credential schemes based on the hardness of ...
A modular approach to constructing cryptographic protocols leads to simple designs but often ineffic...
It takes time for theoretical advances to get used in practical schemes. Anonymous cre-dential schem...
International audienceStructure-preserving signatures (SPS) are a powerful building block for crypto...
Abstract. Structure-preserving signatures are a quite recent but important building block for many c...
International audienceAnonymous attribute-based credentials (ABCs) are a powerful tool allowing user...
International audienceAnonymous attribute-based credentials (ABCs) are a powerful tool allowing user...
International audienceAnonymous attribute-based credentials (ABCs) are a powerful tool allowing user...
International audienceStructure-preserving signatures on equivalence classes, or equivalence-class s...
International audienceStructure-preserving signatures on equivalence classes, or equivalence-class s...
At ASIACRYPT’14 Hanser and Slamanig proposed a new primitive called structure-preserving signa-tures...
International audienceMany attribute-based anonymous credential (ABC) schemes have been proposed all...
International audienceRandomizable encryption lets anyone randomize a ciphertext so it is distribute...
International audienceAnonymous credentials are protocols in which users obtain certificates from or...
International audienceAnonymous credentials are protocols in which users obtain certificates from or...
We present a framework for building practical anonymous credential schemes based on the hardness of ...
A modular approach to constructing cryptographic protocols leads to simple designs but often ineffic...
It takes time for theoretical advances to get used in practical schemes. Anonymous cre-dential schem...
International audienceStructure-preserving signatures (SPS) are a powerful building block for crypto...
Abstract. Structure-preserving signatures are a quite recent but important building block for many c...
International audienceAnonymous attribute-based credentials (ABCs) are a powerful tool allowing user...
International audienceAnonymous attribute-based credentials (ABCs) are a powerful tool allowing user...
International audienceAnonymous attribute-based credentials (ABCs) are a powerful tool allowing user...
International audienceStructure-preserving signatures on equivalence classes, or equivalence-class s...
International audienceStructure-preserving signatures on equivalence classes, or equivalence-class s...
At ASIACRYPT’14 Hanser and Slamanig proposed a new primitive called structure-preserving signa-tures...
International audienceMany attribute-based anonymous credential (ABC) schemes have been proposed all...
International audienceRandomizable encryption lets anyone randomize a ciphertext so it is distribute...
International audienceAnonymous credentials are protocols in which users obtain certificates from or...
International audienceAnonymous credentials are protocols in which users obtain certificates from or...
We present a framework for building practical anonymous credential schemes based on the hardness of ...
A modular approach to constructing cryptographic protocols leads to simple designs but often ineffic...
It takes time for theoretical advances to get used in practical schemes. Anonymous cre-dential schem...