Motivated by the need to have secure blind signatures even in the presence of quantum computers, we present two efficient blind signature schemes based on hard worst-case lattice problems. Both schemes are provably secure in the random oracle model and unconditionally blind. The first scheme is based on preimage samplable functions that were introduced at STOC 2008 by Gentry, Peikert, and Vaikuntanathan. The scheme is stateful and runs in 3 moves. The second scheme builds upon the PKC 2008 identification scheme of Lyubashevsky. It is stateless, has 4 moves, and its security is based on the hardness of worst-case problems in ideal lattices
Motivated by the need to have secure strong designate verifier signatures (SDVS) even in the presenc...
Cryptography based on the theory of error correcting codes and lattices has received a wide attentio...
We present a framework for building practical anonymous credential schemes based on the hardness of ...
Motivated by the need to have secure blind signatures even in the presence of quantum computers, we ...
With the rapid development of quantum computing and quantum information technology, the universal qu...
We observe that all previously known lattice-based blind signature schemes contain subtle flaws in t...
Building cryptographic schemes upon as many fundamentally different hard problems as possible, seems...
A proxy blind signature scheme is a special form of blind signature which allowed a designated perso...
We propose a 2-round blind signature protocol based on the random oracle heuristic and the hardness ...
A blind signature enables a user to obtain signatures on any message from an authority who cannot ac...
International audienceWe provide an alternative method for constructing lattice-based digital signat...
Abstract. We provide an alternative method for constructing lattice-based digital signatures which d...
Blind Signatures are a useful primitive for privacy preserving applications such as electronic payme...
Motivated by the need to have secure strong designate verifier signatures (SDVS) even in the presenc...
Digital signatures are indispensable for security on the Internet, because they guarantee authentici...
Motivated by the need to have secure strong designate verifier signatures (SDVS) even in the presenc...
Cryptography based on the theory of error correcting codes and lattices has received a wide attentio...
We present a framework for building practical anonymous credential schemes based on the hardness of ...
Motivated by the need to have secure blind signatures even in the presence of quantum computers, we ...
With the rapid development of quantum computing and quantum information technology, the universal qu...
We observe that all previously known lattice-based blind signature schemes contain subtle flaws in t...
Building cryptographic schemes upon as many fundamentally different hard problems as possible, seems...
A proxy blind signature scheme is a special form of blind signature which allowed a designated perso...
We propose a 2-round blind signature protocol based on the random oracle heuristic and the hardness ...
A blind signature enables a user to obtain signatures on any message from an authority who cannot ac...
International audienceWe provide an alternative method for constructing lattice-based digital signat...
Abstract. We provide an alternative method for constructing lattice-based digital signatures which d...
Blind Signatures are a useful primitive for privacy preserving applications such as electronic payme...
Motivated by the need to have secure strong designate verifier signatures (SDVS) even in the presenc...
Digital signatures are indispensable for security on the Internet, because they guarantee authentici...
Motivated by the need to have secure strong designate verifier signatures (SDVS) even in the presenc...
Cryptography based on the theory of error correcting codes and lattices has received a wide attentio...
We present a framework for building practical anonymous credential schemes based on the hardness of ...