We present a framework for building practical anonymous credential schemes based on the hardness of lattice problems. The running time of the prover and verifier is independent of the number of users and linear in the number of attributes. The scheme is also compact in practice, with the proofs being as small as a few dozen kilobytes for arbitrarily large (say up to $2^{128}$) users with each user having several attributes. The security of our scheme is based on a new family of lattice assumptions which roughly states that given short pre-images of random elements in some set $S$, it is hard to create a pre-image for a fresh element in such a set. We show that if the set admits efficient zero-knowledge proofs of knowledge of a commitment ...
International audienceAn accumulator is a function that hashes a set of inputs into a short, constan...
There has been a lot of recent progress in constructing efficient zero-knowledge proofs for showing ...
International audienceLattice problems are an attractive basis for cryptographic systems because the...
We present a framework for building practical anonymous credential schemes based on the hardness of ...
Higher-level cryptographic privacy-enhancing protocols such as anonymous credentials, voting schemes...
Anonymous authentication schemes such as group signatures and anonymous credentials are important pr...
We define and propose an efficient and provably secure construction of blind signatures with attribu...
International audienceDigital signature is an essential primitive in cryptography, which can be used...
Privacy and control over data have become a public concern. Simultaneously, the increasing likelihoo...
International audienceA recent line of works – initiated by Gordon, Katz and Vaikuntanathan (Asiacry...
International audienceAuthentication on the Internet usually has the drawback of leaking the identit...
Building cryptographic schemes upon as many fundamentally different hard problems as possible, seems...
Attribute based signature schemes (ABS) constitute important and powerful primitives when it comes t...
We construct an efficient delegatable anonymous credentials system. Users can anonymously and unlink...
Motivated by the need to have secure blind signatures even in the presence of quantum computers, we ...
International audienceAn accumulator is a function that hashes a set of inputs into a short, constan...
There has been a lot of recent progress in constructing efficient zero-knowledge proofs for showing ...
International audienceLattice problems are an attractive basis for cryptographic systems because the...
We present a framework for building practical anonymous credential schemes based on the hardness of ...
Higher-level cryptographic privacy-enhancing protocols such as anonymous credentials, voting schemes...
Anonymous authentication schemes such as group signatures and anonymous credentials are important pr...
We define and propose an efficient and provably secure construction of blind signatures with attribu...
International audienceDigital signature is an essential primitive in cryptography, which can be used...
Privacy and control over data have become a public concern. Simultaneously, the increasing likelihoo...
International audienceA recent line of works – initiated by Gordon, Katz and Vaikuntanathan (Asiacry...
International audienceAuthentication on the Internet usually has the drawback of leaking the identit...
Building cryptographic schemes upon as many fundamentally different hard problems as possible, seems...
Attribute based signature schemes (ABS) constitute important and powerful primitives when it comes t...
We construct an efficient delegatable anonymous credentials system. Users can anonymously and unlink...
Motivated by the need to have secure blind signatures even in the presence of quantum computers, we ...
International audienceAn accumulator is a function that hashes a set of inputs into a short, constan...
There has been a lot of recent progress in constructing efficient zero-knowledge proofs for showing ...
International audienceLattice problems are an attractive basis for cryptographic systems because the...