DL-extractable UC-commitment schemes

B Abdolmaleki, K Baghery, H Lipmaa, J Siim… - … and Network Security …, 2019 - Springer
scheme for scalars [19]. To avoid using non-falsifiable assumptions in this case, one can use
a DL-extractable commitment scheme … ) of a DL-extractable commitment scheme. Intuitively, …

A framework for uc-secure commitments from publicly computable smooth projective hashing

B Abdolmaleki, H Khoshakhlagh… - Cryptography and Coding …, 2019 - Springer
… Consequently, assuming point compression is used in both schemes, the commitment
and opening size of the UC-commitment in [2] is 1799 and 512 bits respectively. Our UC-secure …

[PDF][PDF] BEHZAD ABDOLMALEKI

OS Non-Interactive - core.ac.uk
DL-extractable UC-commitment schemes. In ACNS 2019, volume 11464 of LNCS, pages …
commitments and propose a new scheme called DL-extractable commitment that allows one to …

UC-secure CRS generation for SNARKs

B Abdolmaleki, K Baghery, H Lipmaa, J Siim… - Progress in Cryptology …, 2019 - Springer
… [1] recently proposed a discrete logarithm extractable (DL-extractable) UC-commitment
scheme. Differently from the usual UC-commitment, a committer will open the commitment to \([m]…

[PDF][PDF] Design of Extended Core Protocols

TS TUE, KB UT, V Botta, M Ciampi, A Kiayias, BS TUE… - 2019 - media.voog.com
… 19a] recently proposed a discrete logarithm extractable (DL-extractable) UC-commitment
scheme. Differently from the usual UC-commitment, a committer will open the commitment to [m]…

A flexible and scalable malicious secure aggregation protocol for federated learning

J Tang, H Xu, M Wang, T Tang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
DL-extractable and equivocable commitment scheme for vectors, which may be of independent
interest. It is based on two commitment schemes (… a DLextractable UC commitment [50] in …

Scalable decentralized privacy-preserving usage-based insurance for vehicles

H Qi, Z Wan, Z Guan, X Cheng - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
scheme, called DUBI, based on the blockchain technology and zero-knowledge proof. In our
scheme, a … 1) We propose DUBI, a fully decentralized UBI scheme based on the blockchain …

A non-interactive shuffle argument with low trust assumptions

A Aggelakis, P Fauzi, G Korfiatis, P Louridas… - Topics in Cryptology–CT …, 2020 - Springer
… al.’s protocol which avoids the ROM by using a DL-extractable UC-commitment [ABL+19a]. …
_{i, r}\) with a UC-secure DL-extractable commitment scheme. This is followed by an opening …

A bivariate polynomial-based cryptographic hard problem and its applications

B Bagherpour - Designs, Codes and Cryptography, 2023 - Springer
… We also propose a new commitment scheme using the RSA-polynomial problem. The
proposed scheme outperforms the previous commitment schemes and is free of any group-…

Strong Privacy-Preserving Universally Composable AKA Protocol with Seamless Handover Support for Mobile Virtual Network Operator

R Alnashwan, Y Yang, Y Dong, P Gope… - arXiv preprint arXiv …, 2024 - arxiv.org
… In this paper, we propose a universally composable authentication and handover scheme
with strong user privacy support, where each MVNO user can validate a mobile operator (MNO…