Proofs for inner pairing products and applications

B Bünz, M Maller, P Mishra, N Tyagi… - Advances in Cryptology …, 2021 - Springer
We present a generalized inner product argument and demonstrate its applications to
pairing-based languages. We apply our generalized argument to prove that an inner pairing …

With a little help from my friends: Constructing practical anonymous credentials

L Hanzlik, D Slamanig - Proceedings of the 2021 ACM SIGSAC …, 2021 - dl.acm.org
Anonymous credentials (ACs) are a powerful cryptographic tool for the secure use of digital
services, when simultaneously aiming for strong privacy guarantees of users combined with …

[PDF][PDF] ZEBRA: Anonymous Credentials with Practical On-chain Verification and Applications to KYC in DeFi.

D Rathee, GV Policharla, T Xie, R Cottone… - IACR Cryptol. ePrint …, 2022 - iacr.steepath.eu
ZEBRA is an Anonymous Credential (AC) scheme, supporting auditability and revocation,
that provides practical on-chain verification for the first time. It realizes efficient access …

ZAMA: A ZKP-based anonymous mutual authentication scheme for the IoV

N Xi, W Li, L Jing, J Ma - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
Internet of Vehicles (IoV) is a typical application of mobile Internet of Things (IoT), which
aims to improve road conditions and enhance the driving experience. However, the issue of …

Aggregate signatures with versatile randomization and issuer-hiding multi-authority anonymous credentials

O Mir, B Bauer, S Griffy, A Lysyanskaya… - Proceedings of the 2023 …, 2023 - dl.acm.org
Anonymous credentials (AC) offer privacy in user-centric identity management. They enable
users to authenticate anonymously, revealing only necessary attributes. With the rise of …

Sok: data sovereignty

J Ernstberger, J Lauinger, F Elsheimy… - 2023 IEEE 8th …, 2023 - ieeexplore.ieee.org
Society appears to be on the verge of recognizing the need for control over sensitive data in
modern web applications. Recently, many systems claim to give control to individuals …

Improved constructions of anonymous credentials from structure-preserving signatures on equivalence classes

A Connolly, P Lafourcade, O Perez Kempner - … Conference on Public-Key …, 2022 - Springer
Anonymous attribute-based credentials (ABCs) are a powerful tool allowing users to
authenticate while maintaining privacy. When instantiated from structure-preserving …

Composable and modular anonymous credentials: Definitions and practical constructions

J Camenisch, M Dubovitskaya, K Haralambiev… - Advances in Cryptology …, 2015 - Springer
It takes time for theoretical advances to get used in practical schemes. Anonymous
credential schemes are no exception. For instance, existing schemes suited for real-world …

Efficient redactable signature and application to anonymous credentials

O Sanders - IACR International Conference on Public-Key …, 2020 - Springer
Let us assume that Alice has received a constant-size signature on a set of messages {m_i\}
_ i= 1^ n from some organization. Depending on the situation, Alice might need to disclose …

Practical Post-Quantum Signatures for Privacy

S Argo, T Güneysu, C Jeudy, G Land… - Proceedings of the …, 2024 - dl.acm.org
The transition to post-quantum cryptography has been an enormous challenge and effort for
cryptographers over the last decade, with impressive results such as the future NIST …