A lattice-based group signature scheme with message-dependent opening

B Libert, F Mouhartem, K Nguyen - … , ACNS 2016, Guildford, UK, June 19 …, 2016 - Springer
Group signatures are an important anonymity primitive allowing users to sign messages
while hiding in a crowd. At the same time, signers remain accountable since an authority is …

An efficient fully dynamic group signature with message dependent opening from lattice

Y Sun, Y Liu - Cybersecurity, 2021 - Springer
Message-dependent opening is one of the solutions to solve the problem of the tracing
manager owns excessive power. In this paper, we present a new lattice-based fully dynamic …

Ring signatures with user-controlled linkability

D Fiore, L Garms, D Kolonelos, C Soriente… - European Symposium on …, 2022 - Springer
Anonymous authentication primitives, eg, group or ring signatures, allow one to realize
privacy-preserving data collection applications, as they strike a balance between …

Group signatures with message-dependent opening in the standard model

B Libert, M Joye - Cryptographers' Track at the RSA Conference, 2014 - Springer
Group signatures allow members of a group to anonymously sign messages in the name of
this group. They typically involve an opening authority that can identify the origin of any …

Secure VANET applications with a refined group signature

MSI Mamun, A Miyaji - 2014 Twelfth Annual International …, 2014 - ieeexplore.ieee.org
This paper proposes an application-friendly group signature (GS) model for wireless ad hoc
network like Wireless Sensor Networks (WSN) or Vehicle ad hoc Network (VANET). Our new …

Group Signatures with Message‐Dependent Opening: Formal Definitions and Constructions

K Emura, G Hanaoka, Y Kawai… - Security and …, 2019 - Wiley Online Library
This paper introduces a new capability for group signatures called message-dependent
opening. It is intended to weaken the high trust placed on the opener; ie, no anonymity …

The opening capability for security against privacy infringements in the smart grid environment

S Eom, JH Huh - Mathematics, 2018 - mdpi.com
It is now known that more information can be leaked into the smart grid environment than
into the existing environment. In particular, specific information such as energy consumption …

Group signatures with designated traceability

H Anada, M Fukumitsu… - 2021 Ninth International …, 2021 - ieeexplore.ieee.org
We propose a group signature scheme with a function of designated traceability; each
opener has attributes and a signer of a group signature can be traced by only the openers …

An r‐Hiding Revocable Group Signature Scheme: Group Signatures with the Property of Hiding the Number of Revoked Users

K Emura, A Miyaji, K Omote - Journal of Applied Mathematics, 2014 - Wiley Online Library
If there are many displaced workers in a company, then a person who goes for job hunting
might not select this company. That is, the number of members who quit is quite negative …

Don't Trust Setup! New Directions in Pre-Constrained Cryptography

S Agrawal, S Kumari, R Nishimaki - Cryptology ePrint Archive, 2024 - eprint.iacr.org
The recent works of Ananth et al.(ITCS 2022) and Bartusek et al.(Eurocrypt 2023) initiated
the study of pre-constrained cryptography which achieves meaningful security even against …