International audienceBasing signature schemes on strong lattice problems has been a long standing open issue. Today, two families of lattice-based signature schemes are known: the ones based on the hash-and-sign construction of Gentry et al.; and Lyubashevsky's schemes, which are based on the Fiat-Shamir framework. In this paper we show for the first time how to adapt the schemes of Lyubashevsky to the ring signature setting. In particular we transform the scheme of ASIACRYPT 2009 into a ring signature scheme that provides strong properties of security under the random oracle model. Anonymity is ensured in the sense that signatures of different users are within negligible statistical distance even under full key exposure. In fact, the sche...
Abstract. Ring signature enables an user to anonymously sign a message on behalf of a group of users...
First proposed in CryptoNote, a collection of popular privacy-centric cryptocurrencies have employed...
A blind signature enables a user to obtain signatures on any message from an authority who cannot ac...
International audienceBasing signature schemes on strong lattice problems has been a long standing o...
Basing signature schemes on strong lattice problems has been a long standing open issue. Today, two ...
In a ring signature scheme, a user selects an arbitrary ring to be able to sign a message on behalf ...
In this paper, a novel linkable ring signature scheme is constructed. The hash value of the public k...
Ring signatures, first introduced by Rivest, Shamir, and Tauman, enable a user to sign a message so ...
International audienceWe provide an alternative method for constructing lattice-based digital signat...
Abstract. We provide an alternative method for constructing lattice-based digital signatures which d...
Lattice-based cryptography has known during the last decade rapid develop- ments thanks to stronger ...
While ring signatures can provide unconditional anonymity to the signing user, they are vulnerable t...
Unique ring signatures (URS) were introduced by Franklin and Zhang (FC 2012) as a unification of lin...
International audience—Ring signatures were introduced by Rivest, Shamir and Tauman in 2001 [32]. Th...
Deniable ring signature can be regarded as group signature without group manager, in which a singer ...
Abstract. Ring signature enables an user to anonymously sign a message on behalf of a group of users...
First proposed in CryptoNote, a collection of popular privacy-centric cryptocurrencies have employed...
A blind signature enables a user to obtain signatures on any message from an authority who cannot ac...
International audienceBasing signature schemes on strong lattice problems has been a long standing o...
Basing signature schemes on strong lattice problems has been a long standing open issue. Today, two ...
In a ring signature scheme, a user selects an arbitrary ring to be able to sign a message on behalf ...
In this paper, a novel linkable ring signature scheme is constructed. The hash value of the public k...
Ring signatures, first introduced by Rivest, Shamir, and Tauman, enable a user to sign a message so ...
International audienceWe provide an alternative method for constructing lattice-based digital signat...
Abstract. We provide an alternative method for constructing lattice-based digital signatures which d...
Lattice-based cryptography has known during the last decade rapid develop- ments thanks to stronger ...
While ring signatures can provide unconditional anonymity to the signing user, they are vulnerable t...
Unique ring signatures (URS) were introduced by Franklin and Zhang (FC 2012) as a unification of lin...
International audience—Ring signatures were introduced by Rivest, Shamir and Tauman in 2001 [32]. Th...
Deniable ring signature can be regarded as group signature without group manager, in which a singer ...
Abstract. Ring signature enables an user to anonymously sign a message on behalf of a group of users...
First proposed in CryptoNote, a collection of popular privacy-centric cryptocurrencies have employed...
A blind signature enables a user to obtain signatures on any message from an authority who cannot ac...