hints: Threshold signatures with silent setup

S Garg, A Jain, P Mukherjee, R Sinha… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
We propose hinTS—a new threshold signature scheme built on top of the widely used BLS
signatures. Our scheme enjoys the following attractive features: A silent setup process …

[HTML][HTML] How is your Wi-Fi connection today? DoS attacks on WPA3-SAE

E Chatzoglou, G Kambourakis, C Kolias - Journal of Information Security …, 2022 - Elsevier
WPA3-Personal renders the Simultaneous Authentication of Equals (SAE) password-
authenticated key agreement method mandatory. The scheme achieves forward secrecy …

A survey of elliptic curves for proof systems

DF Aranha, Y El Housni, A Guillevic - Designs, Codes and Cryptography, 2023 - Springer
Elliptic curves have become key ingredients for instantiating zero-knowledge proofs and
more generally proof systems. Recently, there have been many tailored constructions of …

FABEO: Fast attribute-based encryption with optimal security

D Riepel, H Wee - Proceedings of the 2022 ACM SIGSAC Conference on …, 2022 - dl.acm.org
Attribute-based encryption (ABE) enables fine-grained access control on encrypted data and
has a large number of practical applications. This paper presents FABEO: faster pairing …

Threshold signatures in the multiverse

L Baird, S Garg, A Jain, P Mukherjee… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
We introduce a new notion of multiverse threshold signatures (MTS). In an MTS scheme,
multiple universes–each defined by a set of (possibly overlapping) signers, their weights …

Design and analysis of a distributed ECDSA signing service

J Groth, V Shoup - Cryptology ePrint Archive, 2022 - eprint.iacr.org
We present and analyze a new protocol that provides a distributed ECDSA signing service,
with the following properties:* it works in an asynchronous communication model;* it works …

Faster constant-time evaluation of the Kronecker symbol with application to elliptic curve hashing

DF Aranha, BS Hvass, B Spitters… - Proceedings of the 2023 …, 2023 - dl.acm.org
We generalize the Bernstein-Yang (BY) algorithm [11] for constant-time modular inversion to
compute the Kronecker symbol, of which the Jacobi and Legendre symbols are special …

Provably secure asymmetric PAKE protocol for protecting IoT access

M Qi, W Hu - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
Pake allows two parties who share a memorable password to securely establish a strong
secret key. It has been deployed in many applications around us, such as iCloud service, Wi …

SwiftEC: Shallue-van de Woestijne Indifferentiable Function to Elliptic Curves: Faster Indifferentiable Hashing to Elliptic Curves

J Chávez-Saab, F Rodríguez-Henríquez… - … Conference on the …, 2022 - Springer
Hashing arbitrary values to points on an elliptic curve is a required step in many
cryptographic constructions, and a number of techniques have been proposed to do so over …

A Stronger Secure Ciphertext Fingerprint-Based Commitment Scheme for Robuster Verifiable OD-CP-ABE in IMCC

Z Zhang, W Huang, L Yang, Y Liao… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Outsourced decryption attribute-based encryption (OD-ABE) is emerging as a promising
cryptographic tool to provide efficient fine-grained access control for data accessing and …