Lattice-based cryptography is evolving rapidly and is often employed to design cryptographic primitives that\ua0hold a great promise to be post-quantum resistant and can be employed in multiple application settings such as:\ua0e-cash, unique digital signatures, non-interactive lottery and others.In such application scenarios, a user is often required to prove non-interactively the correct computation of a pseudo-random function F_k(x) without revealing the secret key k used.Commitment schemes are also useful in application settings requiring to commit to a chosen but secret value that could be revealed later.In this short paper, we provide our insights on constructing a lattice-based simulatable verifiable random function (sVRF) using non i...
Abstract A nominative signature (NS) is a cryptographic primitive where two parties collude to produ...
Motivated by the need to have secure strong designate verifier signatures (SDVS) even in the presenc...
Motivated by the need to have secure strong designate verifier signatures (SDVS) even in the presenc...
International audienceBeyond their security guarantees under well-studied assumptions , algebraic ps...
Building cryptographic schemes upon as many fundamentally different hard problems as possible, seems...
We extend the notion of verifiable random functions (VRF) to constrained VRFs, which gen-eralize the...
We extend the notion of verifiable random functions (VRF) to constrained VRFs, which generalize the ...
A functional commitment allows a user to commit to an input $\mathbf{x} \in \{0,1\}^\ell$ and later ...
One essential quest in cryptography is the search for hard instances of a given computational proble...
Pseudorandom functions (PRFs) are the building blocks of symmetric-key cryptography. Almost all cent...
Commitment schemes are among cryptography's most important building blocks. Besides their basic prop...
International audienceWe provide an alternative method for constructing lattice-based digital signat...
Abstract. We provide an alternative method for constructing lattice-based digital signatures which d...
In this work, we propose two post-quantum verifiable random functions (VRFs) constructions based on ...
Zero-knowledge identification schemes solve the problem of authenticating one party to another via ...
Abstract A nominative signature (NS) is a cryptographic primitive where two parties collude to produ...
Motivated by the need to have secure strong designate verifier signatures (SDVS) even in the presenc...
Motivated by the need to have secure strong designate verifier signatures (SDVS) even in the presenc...
International audienceBeyond their security guarantees under well-studied assumptions , algebraic ps...
Building cryptographic schemes upon as many fundamentally different hard problems as possible, seems...
We extend the notion of verifiable random functions (VRF) to constrained VRFs, which gen-eralize the...
We extend the notion of verifiable random functions (VRF) to constrained VRFs, which generalize the ...
A functional commitment allows a user to commit to an input $\mathbf{x} \in \{0,1\}^\ell$ and later ...
One essential quest in cryptography is the search for hard instances of a given computational proble...
Pseudorandom functions (PRFs) are the building blocks of symmetric-key cryptography. Almost all cent...
Commitment schemes are among cryptography's most important building blocks. Besides their basic prop...
International audienceWe provide an alternative method for constructing lattice-based digital signat...
Abstract. We provide an alternative method for constructing lattice-based digital signatures which d...
In this work, we propose two post-quantum verifiable random functions (VRFs) constructions based on ...
Zero-knowledge identification schemes solve the problem of authenticating one party to another via ...
Abstract A nominative signature (NS) is a cryptographic primitive where two parties collude to produ...
Motivated by the need to have secure strong designate verifier signatures (SDVS) even in the presenc...
Motivated by the need to have secure strong designate verifier signatures (SDVS) even in the presenc...