Search
Search Results
-
Functional Commitments for All Functions, with Transparent Setup and from SIS
A functional commitment scheme enables a user to concisely commit to a function from a specified family, then later concisely and verifiably reveal... -
A discrete SIS-model built on the strictly positive scheme
In this paper we introduce and analyze a discrete SIS epidemic model for a homogeneous population. As a discretization method the strictly positive...
-
LaBRADOR: Compact Proofs for R1CS from Module-SIS
The most compact quantum-safe proof systems for large circuits are PCP-type systems such as Ligero, Aurora, and Shockwave, that only use weak... -
Lattice-Based Functional Commitments: Fast Verification and Cryptanalysis
A functional commitment allows a user to commit to an input $$\textbf{x}\in... -
On the (M)iNTRU Assumption in the Integer Case
In AsiaCrypt 2019, Genise, Gentry, Halevi, Li and Micciancio put forth two novel and intriguing computational hardness hypotheses: The inhomogeneous... -
SLAP: Succinct Lattice-Based Polynomial Commitments from Standard Assumptions
Recent works on lattice-based extractable polynomial commitments can be grouped into two classes: (i) non-interactive constructions that stem from... -
Lattice-Based Key-Value Commitment Scheme with Key-Binding and Key-Hiding Properties
Blockchain plays an important role in distributed file systems, such as cryptocurrency. One of the important building blocks of blockchain is the... -
Tagged Chameleon Hash from Lattices and Application to Redactable Blockchain
Chameleon hash (CH) is a trapdoor hash function. Generally it is hard to find collisions, but with the help of a trapdoor, finding collisions becomes... -
Message-Restriction-Free Commitment Scheme Based on Lattice Assumption
A commitment scheme is a fundamental protocol and an essential component of basic cryptographic tasks, such as zero-knowledge identification. In... -
Succinct Vector, Polynomial, and Functional Commitments from Lattices
Vector commitment schemes allow a user to commit to a vector of values... -
Updatable, Aggregatable, Succinct Mercurial Vector Commitment from Lattice
Vector commitments (VC) and their variants attract a lot of attention due to their wide range of usage in applications such as blockchain and... -
Shorter and Faster Identity-Based Signatures with Tight Security in the (Q)ROM from Lattices
We provide identity-based signature (IBS) schemes with tight security against adaptive adversaries, in the (classical or quantum) random oracle model... -
On the usage of epidemiological models for information diffusion over twitter
The way information spreads through online social networks is popularly considered to be similar to how viruses spread through a population. In this...
-
Sigma Protocols for MQ, PKP and SIS, and Fishy Signature Schemes
This work presents sigma protocols to prove knowledge of:... -
Short Identity-Based Signatures with Tight Security from Lattices
We construct a short and adaptively secure identity-based signature scheme tightly based on the well-known Short Integer Solution (SIS) assumption.... -
CTA: Confidential Transactions Protocol with State Accumulator
Considering the increasingly large storage of post-quantum RingCT-like protocols, we construct a blockchain-based confidential transactions protocol... -
A Hierarchical Watermarking Scheme for PRFs from Standard Lattice Assumptions
A software watermarking scheme is to embed a “mark” or a message into a program in a cryptographic way. It is useful in proving ownership (e.g., in... -
Multilinear Schwartz-Zippel Mod N and Lattice-Based Succinct Arguments
We show that for \(\textbf{x}\overset{\$}{\leftarrow }[0,2^\lambda )^\mu \)... -
Puncturable Signature: A Generic Construction and Instantiations
Puncturable signature (PS), proposed by Bellare, Stepanovs and Waters at EUROCRYPT 2016, is a special kind of digital signature that supports a... -
Validation of the Delone and McLean information systems success model: a study on student information system
This study aims to evaluate the success of the Student Information System (SIS) using the updated Information System Success Model (IS success model)...