International audienceAn accumulator is a function that hashes a set of inputs into a short, constant-size string while preserving the ability to efficiently prove the inclusion of a specific input element in the hashed set. It has proved useful in the design of numerous privacy-enhancing protocols, in order to handle revocation or simply prove set membership. In the lattice setting, currently known instantiations of the primitive are based on Merkle trees, which do not interact well with zero-knowledge proofs. In order to efficiently prove the membership of some element in a zero-knowledge manner, the prover has to demonstrate knowledge of a hash chain without revealing it, which is not known to be efficiently possible under well-studied h...
We construct efficient ring signatures from isogeny and lattice assumptions. Our ring signatures are...
International audienceLattice problems are an attractive basis for cryptographic systems because the...
Ring signatures allow for creating signatures on behalf of an ad hoc group of signers, hiding the ...
International audienceAn accumulator is a function that hashes a set of inputs into a short, constan...
Deniable ring signature can be regarded as group signature without group manager, in which a singer ...
In this paper we address the construction of privacy-friendly cryptographic primitives for the post-...
Abstract. We introduce a lattice-based group signature scheme that provides several noticeable impro...
We introduce a lattice-based group signature scheme that provides several noticeable improvements ov...
International audienceA recent line of works – initiated by Gordon, Katz and Vaikuntanathan (Asiacry...
We present a framework for building practical anonymous credential schemes based on the hardness of ...
International audienceGroup encryption (GE) is the natural encryption analogue of group signatures i...
We consider the problem of proving in zero knowledge that an element of a public set satisfies a giv...
Higher-level cryptographic privacy-enhancing protocols such as anonymous credentials, voting schemes...
International audienceGroup signatures are cryptographic primitives where users can anonymously sign...
Privacy and control over data have become a public concern. Simultaneously, the increasing likelihoo...
We construct efficient ring signatures from isogeny and lattice assumptions. Our ring signatures are...
International audienceLattice problems are an attractive basis for cryptographic systems because the...
Ring signatures allow for creating signatures on behalf of an ad hoc group of signers, hiding the ...
International audienceAn accumulator is a function that hashes a set of inputs into a short, constan...
Deniable ring signature can be regarded as group signature without group manager, in which a singer ...
In this paper we address the construction of privacy-friendly cryptographic primitives for the post-...
Abstract. We introduce a lattice-based group signature scheme that provides several noticeable impro...
We introduce a lattice-based group signature scheme that provides several noticeable improvements ov...
International audienceA recent line of works – initiated by Gordon, Katz and Vaikuntanathan (Asiacry...
We present a framework for building practical anonymous credential schemes based on the hardness of ...
International audienceGroup encryption (GE) is the natural encryption analogue of group signatures i...
We consider the problem of proving in zero knowledge that an element of a public set satisfies a giv...
Higher-level cryptographic privacy-enhancing protocols such as anonymous credentials, voting schemes...
International audienceGroup signatures are cryptographic primitives where users can anonymously sign...
Privacy and control over data have become a public concern. Simultaneously, the increasing likelihoo...
We construct efficient ring signatures from isogeny and lattice assumptions. Our ring signatures are...
International audienceLattice problems are an attractive basis for cryptographic systems because the...
Ring signatures allow for creating signatures on behalf of an ad hoc group of signers, hiding the ...