Round-optimal blind signatures are notoriously hard to construct in the standard model, especially in the malicious-signer model, where blindness must hold under adversarially chosen keys. This is substantiated by several impossibility results. The only construction that can be termed theoretically efficient, by Garg and Gupta (Eurocrypt’14), requires complexity leveraging, inducing an exponential security loss. We present a construction of practically efficient round-optimal blind signatures in the standard model. It is conceptually simple and builds on the recent structure-preserving signatures on equivalence classes (SPSEQ) from Asiacrypt’14. While the traditional notion of blindness follows from standard assumptions, we prove blindness ...
Abstract Blind signatures allow users to obtain signatures on messages hidden from the signer; moreo...
International audienceBlind signatures allow users to obtain signatures on messages hidden from the ...
Blind signatures are a fundamental tool for privacy-preserving applications. Known constructions of ...
Round-optimal blind signatures are notoriously hard to construct in the stan-dard model, especially ...
Round-optimal blind signatures are notoriously hard to construct in the standard model, especially i...
International audienceAt Crypto'15 Fuchsbauer, Hanser and Slamanig (FHS) presented the first standar...
International audienceAt Crypto'15 Fuchsbauer, Hanser and Slamanig (FHS) presented the first standar...
At Crypto 2015 Fuchsbauer, Hanser and Slamanig (FHS) presented the first standard-model construction...
At Crypto 2015 Fuchsbauer, Hanser and Slamanig (FHS) presented the first standard-model construction...
Known constructions of blind signature schemes suffer from at least one of the following limitations...
Known constructions of blind signature schemes suffer from at least one of the following limitations...
International audiencePartially-blind signatures find many applications in the area of anonymity, su...
Blind signature schemes provide the functionality of a carbon copy envelope: The user (receiver) put...
Blind signature schemes provide the functionality of a carbon copy envelope: The user (receiver) put...
Blind signatures allow users to obtain signatures on messages hidden from the signer; moreover, the ...
Abstract Blind signatures allow users to obtain signatures on messages hidden from the signer; moreo...
International audienceBlind signatures allow users to obtain signatures on messages hidden from the ...
Blind signatures are a fundamental tool for privacy-preserving applications. Known constructions of ...
Round-optimal blind signatures are notoriously hard to construct in the stan-dard model, especially ...
Round-optimal blind signatures are notoriously hard to construct in the standard model, especially i...
International audienceAt Crypto'15 Fuchsbauer, Hanser and Slamanig (FHS) presented the first standar...
International audienceAt Crypto'15 Fuchsbauer, Hanser and Slamanig (FHS) presented the first standar...
At Crypto 2015 Fuchsbauer, Hanser and Slamanig (FHS) presented the first standard-model construction...
At Crypto 2015 Fuchsbauer, Hanser and Slamanig (FHS) presented the first standard-model construction...
Known constructions of blind signature schemes suffer from at least one of the following limitations...
Known constructions of blind signature schemes suffer from at least one of the following limitations...
International audiencePartially-blind signatures find many applications in the area of anonymity, su...
Blind signature schemes provide the functionality of a carbon copy envelope: The user (receiver) put...
Blind signature schemes provide the functionality of a carbon copy envelope: The user (receiver) put...
Blind signatures allow users to obtain signatures on messages hidden from the signer; moreover, the ...
Abstract Blind signatures allow users to obtain signatures on messages hidden from the signer; moreo...
International audienceBlind signatures allow users to obtain signatures on messages hidden from the ...
Blind signatures are a fundamental tool for privacy-preserving applications. Known constructions of ...