Efficient multiplicative-to-additive function from Joye-Libert cryptosystem and its application to threshold ECDSA

H Xue, MH Au, M Liu, KY Chan, H Cui, X Xie… - Proceedings of the …, 2023 - dl.acm.org
Threshold ECDSA receives interest lately due to its widespread adoption in blockchain
applications. A common building block of all leading constructions involves a secure …

Efficient noninteractive certification of RSA moduli and beyond

S Goldberg, L Reyzin, O Sagga, F Baldimtsi - International Conference on …, 2019 - Springer
In many applications, it is important to verify that an RSA public key (N, e) specifies a
permutation over the entire space Z _N, in order to prevent attacks due to adversarially …

Zero-Knowledge Arguments for Subverted RSA Groups

D Kolonelos, M Maller, M Volkhov - IACR International Conference on …, 2023 - Springer
This work investigates zero-knowledge protocols in subverted RSA groups where the prover
can choose the modulus and where the verifier does not know the group order. We …

Improvements on Non-Interactive Zero-Knowledge Proof Systems Related to Quadratic Residuosity Languages

W Liu, J Weng, B Zhang, K He, J Huang - Information Sciences, 2022 - Elsevier
Non-interactive zero-knowledge (NIZK) proof systems are very useful for statement
verification without interaction in cryptography; they entail just one message, called the …

Public-key generation with verifiable randomness

O Blazy, P Towa, D Vergnaud - … 2020: 26th International Conference on the …, 2020 - Springer
We revisit the problem of proving that a user algorithm selected and correctly used a truly
random seed in the generation of her cryptographic key. A first approach was proposed in …

Elementary attestation of cryptographically useful composite moduli

R Géraud-Stewart, D Naccache - International Conference on Information …, 2020 - Springer
This paper describes a non-interactive process allowing a prover to convince a verifier that a
modulus n is the product of two primes (p, q) of about the same size. A further heuristic …

Magnetic RSA

R Géraud-Stewart, D Naccache - Cryptology ePrint Archive, 2021 - eprint.iacr.org
In a recent paper Géraud-Stewart and Naccache\cite {gsn2021}(GSN) described an non-
interactive process allowing a prover $\mathcal P $ to convince a verifier $\mathcal V $ that …

Privacy-preserving cryptographic protocols

P Towa - 2020 - theses.hal.science
This manuscript proposes new cryptographic protocols that are respectful of users' privacy
and which have real-world applications. In a first part, the focus is on group signatures, a …