-
公开(公告)号:US20240187255A1
公开(公告)日:2024-06-06
申请号:US18277232
申请日:2021-04-28
发明人: Claudio SORIENTE , Dario FIORE
CPC分类号: H04L9/3255 , H04L9/0861
摘要: A method to enhance an anonymous signature scheme with user-controlled linkability includes generating, by a signer of a ring signature scheme or a group signature scheme, a signer-specific secret (x) and generating a secret key based on the generated secret (x). The signer augments a message to be signed with a message-unique value that is related to the signer-specific secret (x) thereby generating an augmented message. The signer signs the augmented message with the secret key of the signer and produces a proof that an arbitrary set of signed messages embed the signer-specific secret (x). The signer anonymously publishes the produced proof for verification by a third-party verifier.
-
2.
公开(公告)号:US20230269089A1
公开(公告)日:2023-08-24
申请号:US18020272
申请日:2021-02-17
发明人: Claudio SORIENTE , Dario FIORE
CPC分类号: H04L9/3242 , H04L9/008
摘要: A method for performing computation of a function over encrypted data by a computation entity is provided. According to the method, the computation of a quadratic function is performed by the computation entity, the encrypted data are encrypted by a linearly homomorphic encryption scheme, and a homomorphic message authentication code is used for providing verifiable computation on encrypted data.
-
公开(公告)号:US20240364506A1
公开(公告)日:2024-10-31
申请号:US18291257
申请日:2021-08-20
发明人: Claudio SORIENTE , Dario FIORE
IPC分类号: H04L9/08
CPC分类号: H04L9/0852
摘要: The present invention relates to a computer-implemented method for execution of a cryptographic sortition among a group of parties (210, 220). According to an embodiment of the invention, the method comprises committing, by a first party (210) of the group, to a set of n party-specific secret keys k1, . . . , kn for a block cipher E; obtaining, by the first party (210) and at least a second party (220) of the group, a common input x and an index r; encrypting, by the first party (210), the input x with the r-th key kr of the committed keys k1, . . . , kn, thereby generating an output y1 of the block-cipher E, and publishing the output y1 together with the key kr used for encryption; and encrypting, by the second party (220), the common input x with the key kr published by the first party (210), thereby generating an output y1′ of the block-cipher E, and comparing the generated output y1′ with the output y1 published by the first party (210).
-
-