2018
DOI: 10.1007/s00145-018-9281-4
|View full text |Cite
|
Sign up to set email alerts
|

Structure-Preserving Signatures on Equivalence Classes and Constant-Size Anonymous Credentials

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
108
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 66 publications
(108 citation statements)
references
References 80 publications
0
108
0
Order By: Relevance
“…It uses an equivalence class signature (EQS) scheme, a public-key encryption (PKE) scheme, a hash function (modeled as a random oracle) with images living in G 2 , and a verifiable ring signature (VRS) scheme. We suggest to instantiate our construction with the EQS scheme of Fuchsbauer, Hanser, and Slamanig [20], the PKE scheme obtained by applying the Fujisaki-Okamoto transformation [21] to the ElGamal encryption scheme [? ], and the VRS scheme of Bultel and Lafourcade [9].…”
Section: Our Resultsmentioning
confidence: 99%
“…It uses an equivalence class signature (EQS) scheme, a public-key encryption (PKE) scheme, a hash function (modeled as a random oracle) with images living in G 2 , and a verifiable ring signature (VRS) scheme. We suggest to instantiate our construction with the EQS scheme of Fuchsbauer, Hanser, and Slamanig [20], the PKE scheme obtained by applying the Fujisaki-Okamoto transformation [21] to the ElGamal encryption scheme [? ], and the VRS scheme of Bultel and Lafourcade [9].…”
Section: Our Resultsmentioning
confidence: 99%
“…Similarly, the papers [147,146] present efficient blind signature schemes which, the papers' titles promise, are proven secure in the "standard model." However, both blind signature schemes employ the "structure-preserving signature scheme on equivalence classes" from [148]. The only known security proof for the latter scheme is in the generic group model.…”
Section: 22mentioning
confidence: 99%
“…Recently, Hanser and Slamanig [33] (then revised by Fuchsbauer et al [29]) proposed the first credential system where the communication complexity for credential showing is independent of the number of its attributes. Unfortunately, their scheme only supports conjunctive statements and thus lacks expressiveness.…”
Section: Related Workmentioning
confidence: 99%