Enabling efficient threshold signature computation via java card API

A Dufka, P Švenda - Proceedings of the 18th International Conference …, 2023 - dl.acm.org
Threshold signatures are becoming an increasingly popular method of signing key
protection, primarily due to their ability to produce signatures that require the cooperation of …

Non-Transferable Anonymous Tokens by Secret Binding

FB Durak, L Marco, A Talayhan… - Proceedings of the 2024 on …, 2024 - dl.acm.org
Non-transferability (NT) is a security notion which ensures that credentials are only used by
their intended owners. Despite its importance, it has not been formally treated in the context …

Control design of information security related to privacy in the smart SIM business process

MI Fadhil, F Hidayat - 2021 3rd East Indonesia Conference on …, 2021 - ieeexplore.ieee.org
Korlantas Polri has a main task as a supervisor and organizer of traffic functions at the
central level, currently in the process of increasing its digitization capabilities, one of which is …

Achieving Third-party Deniability in Signature-based Credential Systems

M Bertram, M Richter, M Margraf - 2024 IEEE 48th Annual …, 2024 - ieeexplore.ieee.org
Fostering the widespread adoption of digital credentials requires trust and confidence within
the civilian population, which needs to be facilitated through strong privacy guarantees. In …

: A Practical Biometric Authentication Mechanism Based on 3D Fingervein

FB Durak, L Huguenin-Dumittan… - … Conference on Applied …, 2020 - Springer
We design a consecution of protocols which allows organizations to have secure strong
access control of their users to their desktop machines based on biometry. It provides both …

How to Avoid Repetitions in Lattice-Based Deniable Zero-Knowledge Proofs

X Arnal, A Cano, T Finogina, J Herranz - Nordic Conference on Secure IT …, 2022 - Springer
Interactive zero-knowledge systems are a very important cryptographic primitive, used in
many applications, especially when deniability (also known as non-transferability) is …

How to avoid repetitions in lattice-based deniable zero-knowledge proofs

X Arnal i Clemente, A Cano Aguilera, T Finogina… - 2022 - upcommons.upc.edu
Interactive zero-knowledge systems are a very important cryptographic primitive, used in
many applications, especially when deniability (also known as non-transferability) is …

Serial Lightweight Implementation Techniques for Block Ciphers

MF Balli - 2021 - infoscience.epfl.ch
Most of the cryptographic protocols that we use frequently on the internet are designed in a
fashion that they are not necessarily suitable to run in constrained environments …