We study digital signatures with revocation capabilities and show two results. First, we define and construct digital signatures with revocable signing keys from the LWE assumption. In this primitive, the signing key is a quantum state which enables a user to sign many messages and yet, the quantum key is also revocable, i.e., it can be collapsed into a classical certificate which can later be verified. Once the key is successfully revoked, we require that the initial recipient of the key loses the ability to sign. We construct digital signatures with revocable signing keys from a newly introduced primitive which we call two-tier one-shot signatures, which may be of independent interest. This is a variant of one-shot signatures, where the v...
To ensure uninterrupted cryptographic security, it is important to begin planning the transition to ...
We initiate the study of quantum-secure digital signatures and quantum chosen ciphertext security. ...
Smart contracts are cryptographic protocols that are enforced without a judiciary. Smart contracts a...
Cryptography with quantum states exhibits a number of surprising and counter-intuitive features. In ...
Modern digital signature schemes can provide more guarantees than the standard notion of(strong) unf...
Signatures are primarily used as a mark of authenticity, to demonstrate that the sender of a message...
A new post-quantum, hash-based signature (HBS) scheme is introduced. In known HBS, the size and cost...
One-way functions are central to classical cryptography. They are both necessary for the existence o...
Digital signatures are widely used to provide security for electronic communications, for example, i...
We introduce a variant of quantum signatures in which nonbinary symbols are signed instead of bits. ...
We present the first general-purpose digital signature scheme based on supersingular elliptic curve...
Cryptography promises four information security objectives, namely, confidentiality, integrity, auth...
Digital signatures guarantee the authenticity and transferability of messages and are widely used in...
The security guarantees provided by digital signatures are vital to many modern applications such as...
Inspired by the blockchain architecture and existing Merkle tree based signature schemes, we propose...
To ensure uninterrupted cryptographic security, it is important to begin planning the transition to ...
We initiate the study of quantum-secure digital signatures and quantum chosen ciphertext security. ...
Smart contracts are cryptographic protocols that are enforced without a judiciary. Smart contracts a...
Cryptography with quantum states exhibits a number of surprising and counter-intuitive features. In ...
Modern digital signature schemes can provide more guarantees than the standard notion of(strong) unf...
Signatures are primarily used as a mark of authenticity, to demonstrate that the sender of a message...
A new post-quantum, hash-based signature (HBS) scheme is introduced. In known HBS, the size and cost...
One-way functions are central to classical cryptography. They are both necessary for the existence o...
Digital signatures are widely used to provide security for electronic communications, for example, i...
We introduce a variant of quantum signatures in which nonbinary symbols are signed instead of bits. ...
We present the first general-purpose digital signature scheme based on supersingular elliptic curve...
Cryptography promises four information security objectives, namely, confidentiality, integrity, auth...
Digital signatures guarantee the authenticity and transferability of messages and are widely used in...
The security guarantees provided by digital signatures are vital to many modern applications such as...
Inspired by the blockchain architecture and existing Merkle tree based signature schemes, we propose...
To ensure uninterrupted cryptographic security, it is important to begin planning the transition to ...
We initiate the study of quantum-secure digital signatures and quantum chosen ciphertext security. ...
Smart contracts are cryptographic protocols that are enforced without a judiciary. Smart contracts a...