2020
DOI: 10.1007/978-3-030-57990-6_18
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Signatures on Randomizable Ciphertexts

Abstract: Randomizable encryption lets anyone randomize a ciphertext so it is distributed like a fresh encryption of the same plaintext. Signatures on randomizable ciphertexts (SoRC), introduced by Blazy et al. (PKC'11), let one adapt a signature on a ciphertext to a randomization of the latter. Since signatures can only be adapted to ciphertexts that encrypt the same message as the signed ciphertext, signatures obliviously authenticate plaintexts. SoRC have been used as a building block in e-voting, blind signatures an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 36 publications
0
3
0
Order By: Relevance
“…This should hold even if issuers and verifiers collude and ideally even when the issuer is allowed to generate its key material maliciously. Technologies related to ACs found numerous applications such as PrivacyPass [19] and related concepts [33] being integrated into the Trust Tokens API 1 as well as standardized within the Internet Engineering Task Force (IETF), or the PrivateStats proposal by Facebook. 2 A recent large scale real-world application of ACs are private groups within the popular Signal messenger [14].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…This should hold even if issuers and verifiers collude and ideally even when the issuer is allowed to generate its key material maliciously. Technologies related to ACs found numerous applications such as PrivacyPass [19] and related concepts [33] being integrated into the Trust Tokens API 1 as well as standardized within the Internet Engineering Task Force (IETF), or the PrivateStats proposal by Facebook. 2 A recent large scale real-world application of ACs are private groups within the popular Signal messenger [14].…”
Section: Introductionmentioning
confidence: 99%
“…Thus, no selective disclosure is supported, which however is an important feature and thus prevents many privacy-preserving applications. 𝑖𝑖) Bauer and Fuchsbauer [1] point out a drawback of the weak form of anonymity provided by their DAC constructions. That is, if Alice delegates a credential to Bob, she can identify Bob whenever he shows the credential, which results in a severe degradation of Bob's privacy.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation