Provably secure partially blind signatures

M Abe, T Okamoto - Advances in Cryptology—CRYPTO 2000: 20th Annual …, 2000 - Springer
Partially blind signature schemes are an extension of blind signature schemes that allow a
signer to explicitly include necessary information (expiration date, collateral conditions, or …

Post-quantum era privacy protection for intelligent infrastructures

L Malina, P Dzurenda, S Ricci, J Hajny… - IEEE …, 2021 - ieeexplore.ieee.org
As we move into a new decade, the global world of Intelligent Infrastructure (II) services
integrated into the Internet of Things (IoT) are at the forefront of technological advancements …

CSI-otter: Isogeny-based (partially) blind signatures from the class group action with a twist

S Katsumata, YF Lai, JT LeGrow, L Qin - Designs, Codes and …, 2024 - Springer
In this paper, we construct the first provably-secure isogeny-based (partially) blind signature
scheme. While at a high level the scheme resembles the Schnorr blind signature, our work …

Short pairing-free blind signatures with exponential security

S Tessaro, C Zhu - Annual International Conference on the Theory and …, 2022 - Springer
This paper proposes the first practical pairing-free three-move blind signature schemes that
(1) are concurrently secure,(2) produce short signatures (ie, three or four group …

: Privacy-Preserving Communication and Precise Reward Architecture for V2G Networks in Smart Grid

Z Yang, S Yu, W Lou, C Liu - IEEE Transactions on Smart Grid, 2011 - ieeexplore.ieee.org
Vehicle-to-grid (V2G) networks are important components of the smart grid (SG) for their
capability of providing better ancillary services and facilitating the adoption of renewable …

Efficient blind and partially blind signatures without random oracles

T Okamoto - Theory of Cryptography Conference, 2006 - Springer
This paper proposes a new efficient signature scheme from bilinear maps that is secure in
the standard model (ie, without the random oracle model). Our signature scheme is more …

Group signature schemes and payment systems based on the discrete logarithm problem

J Camenisch - 1998 - research-collection.ethz.ch
The security of many cryptographic systems relies on the difficulty of computing discrete
logarithms in certain finite groups. This dissertation studies existing cryptographic protocols …

Providing privacy-aware incentives for mobile sensing

Q Li, G Cao - 2013 IEEE international conference on pervasive …, 2013 - ieeexplore.ieee.org
Mobile sensing exploits data contributed by mobile users (eg, via their smart phones) to
make sophisticated inferences about people and their surrounding and thus can be applied …

Round-optimal composable blind signatures in the common reference string model

M Fischlin - Annual International Cryptology Conference, 2006 - Springer
We build concurrently executable blind signatures schemes in the common reference string
model, based on general complexity assumptions, and with optimal round complexity …

A privacy protection scheme of microgrid direct electricity transaction based on consortium blockchain and continuous double auction

S Zhang, M Pu, B Wang, B Dong - IEEE access, 2019 - ieeexplore.ieee.org
Low cost, high efficiency, price transparency, and timely settlement of transactions are
required for direct transactions between electricity providers and consumers in the …