Motivated by the need to have secure strong designate verifier signatures (SDVS) even in the presence of quantum computers, a post-quantum lattice-based SDVS scheme is proposed based on the hardness of the short integer solution problem (SIS) and the learning with errors problem (LWE). The proposed SDVS scheme utilizes the Bonsai trees and pre-image sample-able function primitives to generate the designate verifier signature (DVS). In this construction, the un- forge-ability is based on the hardness of the SIS problem which is proven in the random oracle model and the non-transferability is based on the hardness of the LWE problem. As an application of the proposed SDVS scheme, we design a strong designate verifier ring signature scheme (SD...
Digital signatures are an important primitive for building secure systems and are used in most real ...
A fuzzy identity-based signature (FIBS) scheme allows a user with identity ID to issue a signature t...
Digital signatures and encryption schemes constitute arguably an integral part of cryptographic sche...
Motivated by the need to have secure strong designate verifier signatures (SDVS) even in the presenc...
Abstract. Support of membership revocation is a desirable functionality for any group signature sche...
Building cryptographic schemes upon as many fundamentally different hard problems as possible, seems...
Motivated by the need to have secure blind signatures even in the presence of quantum computers, we ...
International audienceWe provide an alternative method for constructing lattice-based digital signat...
Abstract. We provide an alternative method for constructing lattice-based digital signatures which d...
Strongly unforgeable signature schemes provide a more stringent security guarantee than the standard...
Abstract. We propose a variant of the “bonsai tree ” signature scheme, a lattice-based existentially...
Support of membership revocation is a desirable functionality for any group signature scheme. Among ...
Lattice-based cryptography is a branch of cryptography exploiting the presumed hardness of some well...
Recently, in order to guarantee security against quantum adversaries, several identification (ID) sc...
It is known that the development of quantum computers will break the cryptographic schemes that are...
Digital signatures are an important primitive for building secure systems and are used in most real ...
A fuzzy identity-based signature (FIBS) scheme allows a user with identity ID to issue a signature t...
Digital signatures and encryption schemes constitute arguably an integral part of cryptographic sche...
Motivated by the need to have secure strong designate verifier signatures (SDVS) even in the presenc...
Abstract. Support of membership revocation is a desirable functionality for any group signature sche...
Building cryptographic schemes upon as many fundamentally different hard problems as possible, seems...
Motivated by the need to have secure blind signatures even in the presence of quantum computers, we ...
International audienceWe provide an alternative method for constructing lattice-based digital signat...
Abstract. We provide an alternative method for constructing lattice-based digital signatures which d...
Strongly unforgeable signature schemes provide a more stringent security guarantee than the standard...
Abstract. We propose a variant of the “bonsai tree ” signature scheme, a lattice-based existentially...
Support of membership revocation is a desirable functionality for any group signature scheme. Among ...
Lattice-based cryptography is a branch of cryptography exploiting the presumed hardness of some well...
Recently, in order to guarantee security against quantum adversaries, several identification (ID) sc...
It is known that the development of quantum computers will break the cryptographic schemes that are...
Digital signatures are an important primitive for building secure systems and are used in most real ...
A fuzzy identity-based signature (FIBS) scheme allows a user with identity ID to issue a signature t...
Digital signatures and encryption schemes constitute arguably an integral part of cryptographic sche...