Higher-level cryptographic privacy-enhancing protocols such as anonymous credentials, voting schemes, and e-cash are often constructed by suitably combining signature, commitment, and encryption schemes with zero-knowledge proofs. Indeed, a large body of protocols have been constructed in that manner from Camenisch-Lysyanskaya signatures and generalized Schnorr proofs. In this paper, we build a similar framework for lattice-based schemes by presenting a signature and commitment scheme that are compatible with Lyubashevsky\u27s Fiat-Shamir proofs with abort, currently the most efficient zero-knowledge proofs for lattices. To cope with the relaxed soundness guarantees of these proofs, we define corresponding notions of relaxed signature and c...
A zero-knowledge proof is a fundamental cryptographic primitive that enables the verification of sta...
Abstract. Lattice problems are an attractive basis for cryptographic systems be-cause they seem to o...
We construct the first tightly secure signature schemes in the multi-user setting with adaptive corr...
We present a framework for building practical anonymous credential schemes based on the hardness of ...
Privacy and control over data have become a public concern. Simultaneously, the increasing likelihoo...
Building cryptographic schemes upon as many fundamentally different hard problems as possible, seems...
There has been a lot of recent progress in constructing efficient zero-knowledge proofs for showing ...
Digital signature is an essential primitive in cryptography, which can be used as the digital analog...
International audienceLattice problems are an attractive basis for cryptographic systems because the...
International audienceAn accumulator is a function that hashes a set of inputs into a short, constan...
We present the first lattice-based group signature scheme whose cryptographic artifacts are of size ...
Lattice-based cryptography is one of the most active research topics in cryptography in recent years...
This paper defines a new practical construction for a code-based signature scheme. We introduce a n...
International audienceA recent line of works – initiated by Gordon, Katz and Vaikuntanathan (Asiacry...
Although they have been studied for a long time, distributed signature protocols have garnered renew...
A zero-knowledge proof is a fundamental cryptographic primitive that enables the verification of sta...
Abstract. Lattice problems are an attractive basis for cryptographic systems be-cause they seem to o...
We construct the first tightly secure signature schemes in the multi-user setting with adaptive corr...
We present a framework for building practical anonymous credential schemes based on the hardness of ...
Privacy and control over data have become a public concern. Simultaneously, the increasing likelihoo...
Building cryptographic schemes upon as many fundamentally different hard problems as possible, seems...
There has been a lot of recent progress in constructing efficient zero-knowledge proofs for showing ...
Digital signature is an essential primitive in cryptography, which can be used as the digital analog...
International audienceLattice problems are an attractive basis for cryptographic systems because the...
International audienceAn accumulator is a function that hashes a set of inputs into a short, constan...
We present the first lattice-based group signature scheme whose cryptographic artifacts are of size ...
Lattice-based cryptography is one of the most active research topics in cryptography in recent years...
This paper defines a new practical construction for a code-based signature scheme. We introduce a n...
International audienceA recent line of works – initiated by Gordon, Katz and Vaikuntanathan (Asiacry...
Although they have been studied for a long time, distributed signature protocols have garnered renew...
A zero-knowledge proof is a fundamental cryptographic primitive that enables the verification of sta...
Abstract. Lattice problems are an attractive basis for cryptographic systems be-cause they seem to o...
We construct the first tightly secure signature schemes in the multi-user setting with adaptive corr...