Not-So-Low Hanging Fruit: Security and Privacy Research Opportunities for IETF Protocols

CA Wood - Proceedings of the Applied Networking Research …, 2023 - dl.acm.org
The IETF is actively developing technical specifications for state-of-the-art cryptographic
protocols that aim to improve user privacy in the areas of privacy-preserving measurement …

Attribute-based anonymous credential: Delegation, traceability, and revocation

P Li, J Lai, Y Yang, M Sun, C Wu, W Wu, X Yuan - Computer Networks, 2023 - Elsevier
Attribute-based anonymous credential schemes have been envisioned with the motivation to
allow users to prove the possession of their attributes interactively with service providers …

Lattice-based blind signatures: Short, efficient, and round-optimal

W Beullens, V Lyubashevsky, NK Nguyen… - Proceedings of the 2023 …, 2023 - dl.acm.org
We propose a 2-round blind signature protocol based on the random oracle heuristic and
the hardness of standard lattice problems (Ring/Module-SIS/LWE and NTRU) with a …

On the Security of Rate-limited Privacy Pass

H Chu, K Do, L Hanzlik - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
The privacy pass protocol allows users to redeem anonymously issued cryptographic tokens
instead of solving annoying CAPTCHAs. The issuing authority verifies the credibility of the …

On PQ/T Hybrid Verifiable Credentials and Presentations to Build Trust in IoT Systems

A Pino, D Margaria, A Vesco - 2024 9th International …, 2024 - ieeexplore.ieee.org
Post Quantum Cryptography (PQC) is relatively new and has yet to stand the test of time.
Therefore, one of the challenges of the transition to PQC is to design protocols that can …

Towards Post-Quantum Verifiable Credentials

T Wood, K Thomas, M Dean, S Kannan… - Proceedings of the 19th …, 2024 - dl.acm.org
Verifiable Credentials (VCs) allow users to assert claims about themselves in a
cryptographically-verifiable way. In last the few years, several different VC schemes have …

[PDF][PDF] Towards Quantum-Safe Architectures for Self-Sovereign Identity

PM Ramakrishna - 2024 - kilthub.cmu.edu
Recent years have seen concerted efforts towards standardizing self-sovereign identity
systems. In such systems, users are given full privacy-preserving control over credentials …

[PDF][PDF] Post-Quantum Anonymous Tokens

S Hauri - 2024 - sebastienhauri.ch
In the complex mosaic of the modern internet infrastructure, Content Delivery Networks
(CDNs) are proving to be essential facilitators, streamlining the global distribution of internet …