Key research themes
1. How can signature schemes achieve provable security grounded in hard computational problems for practical and efficient authentication?
This research theme focuses on constructing identification and signature schemes with formal security proofs based on well-studied computational problems. Such schemes aim to balance theoretical security guarantees with practical efficiency, leading to robust signature protocols suitable for real-world applications.
2. What advancements ensure post-quantum security and efficiency in lattice- and code-based signature schemes?
Given the advent of quantum computing threatening classical cryptosystems, this research theme explores signature schemes based on mathematical problems believed to be resistant to quantum attacks. It encompasses lattice-based and code-based cryptography, focusing on constructing efficient, provably secure signature protocols suitable for deployment in the post-quantum era.
3. How can signature schemes be optimized for resource-constrained environments and emerging applications such as IoT and privacy-preserving group settings?
This theme investigates signature schemes tailored for constrained devices and new application domains requiring privacy, efficiency, or specialized functionality such as blind, identity-based, or group signatures. Techniques include lightweight asymmetric cryptography, elliptic curves, group rings, and sanitizable signatures, all aiming to balance security, computational cost, and privacy guarantees in practical deployments.