scholarly journals Round-optimal Constant-size Blind Signatures

Author(s):  
Olivier Blazy ◽  
Brouilhet Laura ◽  
Céline Chevalier ◽  
Neals Fournaise
Informatica ◽  
2006 ◽  
Vol 17 (4) ◽  
pp. 551-564 ◽  
Author(s):  
Constantin Popescu

2021 ◽  
Vol 29 (2) ◽  
pp. 229-271
Author(s):  
Panagiotis Grontas ◽  
Aris Pagourtzis ◽  
Alexandros Zacharakis ◽  
Bingsheng Zhang

This work formalizes Publicly Auditable Conditional Blind Signatures (PACBS), a new cryptographic primitive that allows the verifiable issuance of blind signatures, the validity of which is contingent upon a predicate and decided by a designated verifier. In particular, when a user requests the signing of a message, blinded to protect her privacy, the signer embeds data in the signature that makes it valid if and only if a condition holds. A verifier, identified by a private key, can check the signature and learn the value of the predicate. Auditability mechanisms in the form of non-interactive zero-knowledge proofs are provided, so that a cheating signer cannot issue arbitrary signatures and a cheating verifier cannot ignore the embedded condition. The security properties of this new primitive are defined using cryptographic games. A proof-of-concept construction, based on the Okamoto–Schnorr blind signatures infused with a plaintext equivalence test is presented and its security is analyzed.


Sensors ◽  
2021 ◽  
Vol 21 (10) ◽  
pp. 3515
Author(s):  
Sung-Ho Sim ◽  
Yoon-Su Jeong

As the development of IoT technologies has progressed rapidly recently, most IoT data are focused on monitoring and control to process IoT data, but the cost of collecting and linking various IoT data increases, requiring the ability to proactively integrate and analyze collected IoT data so that cloud servers (data centers) can process smartly. In this paper, we propose a blockchain-based IoT big data integrity verification technique to ensure the safety of the Third Party Auditor (TPA), which has a role in auditing the integrity of AIoT data. The proposed technique aims to minimize IoT information loss by multiple blockchain groupings of information and signature keys from IoT devices. The proposed technique allows IoT information to be effectively guaranteed the integrity of AIoT data by linking hash values designated as arbitrary, constant-size blocks with previous blocks in hierarchical chains. The proposed technique performs synchronization using location information between the central server and IoT devices to manage the cost of the integrity of IoT information at low cost. In order to easily control a large number of locations of IoT devices, we perform cross-distributed and blockchain linkage processing under constant rules to improve the load and throughput generated by IoT devices.


2013 ◽  
Vol 7 (2) ◽  
pp. 249-261 ◽  
Author(s):  
Man Ho Au ◽  
Willy Susilo ◽  
Yi Mu ◽  
Sherman S. M. Chow

1975 ◽  
Vol 7 (5) ◽  
pp. 589-599 ◽  
Author(s):  
E A C Thomas ◽  
O Davies

This paper examines the changes over time in the spatial dispersion of facilities in a bounded one-dimensional habitat. Each facility produces a single good for a unique market area and demand for the good varies inversely with distance to the nearest facility and increases uniformly over time. Production and transportation cost functions are not assumed to be linear, and it is assumed that market areas are chosen so as to minimise the average cost of producing and transporting unit amount of the good. Conditions relating the demand function to the transportation cost function are given which are necessary and/or sufficient for the size of the market area to decrease over time. It is shown that if the market area has constant size, ‘balanced growth’ occurs if and only if the demand function is of the Pareto type. Finally, the relevance to this analysis of economies of scale is discussed.


Sign in / Sign up

Export Citation Format

Share Document