Blockchain-based secure data storage protocol for sensors in the industrial internet of things

J Lu, J Shen, P Vijayakumar… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The Industrial Internet of Things (IIoT) that introduces Internet of Things (IoT) technology into
industrial environments is beneficial to construct smart factories. It utilizes various sensors to …

Short randomizable signatures

D Pointcheval, O Sanders - Topics in Cryptology-CT-RSA 2016: The …, 2016 - Springer
Digital signature is a fundamental primitive with numerous applications. Following the
development of pairing-based cryptography, several taking advantage of this setting have …

With a little help from my friends: Constructing practical anonymous credentials

L Hanzlik, D Slamanig - Proceedings of the 2021 ACM SIGSAC …, 2021 - dl.acm.org
Anonymous credentials (ACs) are a powerful cryptographic tool for the secure use of digital
services, when simultaneously aiming for strong privacy guarantees of users combined with …

Aggregate signatures with versatile randomization and issuer-hiding multi-authority anonymous credentials

O Mir, B Bauer, S Griffy, A Lysyanskaya… - Proceedings of the 2023 …, 2023 - dl.acm.org
Anonymous credentials (AC) offer privacy in user-centric identity management. They enable
users to authenticate anonymously, revealing only necessary attributes. With the rise of …

Structure-preserving signatures on equivalence classes and constant-size anonymous credentials

G Fuchsbauer, C Hanser, D Slamanig - Journal of Cryptology, 2019 - Springer
Abstract Structure-preserving signatures (SPS) are a powerful building block for
cryptographic protocols. We introduce SPS on equivalence classes (SPS-EQ), which allow …

Improved constructions of anonymous credentials from structure-preserving signatures on equivalence classes

A Connolly, P Lafourcade, O Perez Kempner - … Conference on Public-Key …, 2022 - Springer
Anonymous attribute-based credentials (ABCs) are a powerful tool allowing users to
authenticate while maintaining privacy. When instantiated from structure-preserving …

Composable and modular anonymous credentials: Definitions and practical constructions

J Camenisch, M Dubovitskaya, K Haralambiev… - Advances in Cryptology …, 2015 - Springer
It takes time for theoretical advances to get used in practical schemes. Anonymous
credential schemes are no exception. For instance, existing schemes suited for real-world …

SoK: anonymous credentials

SA Kakvi, KM Martin, C Putman, EA Quaglia - International Conference on …, 2023 - Springer
Anonymous credentials are a powerful tool for making assertions about identity while
maintaining privacy and have been the subject of study for many years. The interest in …

Practical round-optimal blind signatures in the standard model

G Fuchsbauer, C Hanser, D Slamanig - Annual Cryptology Conference, 2015 - Springer
Round-optimal blind signatures are notoriously hard to construct in the standard model,
especially in the malicious-signer model, where blindness must hold under adversarially …

On security proofs of existing equivalence class signature schemes

B Bauer, G Fuchsbauer, F Regen - … on the Theory and Application of …, 2025 - Springer
Equivalence class signatures (EQS; Asiacrypt'14), sign vectors of elements from a bilinear
group. Anyone can transform a signature on a vector to a signature on any multiple of that …