Provably secure partially blind signatures
M Abe, T Okamoto - Advances in Cryptology—CRYPTO 2000: 20th Annual …, 2000 - Springer
Partially blind signature schemes are an extension of blind signature schemes that allow a
signer to explicitly include necessary information (expiration date, collateral conditions, or …
signer to explicitly include necessary information (expiration date, collateral conditions, or …
Post-quantum era privacy protection for intelligent infrastructures
As we move into a new decade, the global world of Intelligent Infrastructure (II) services
integrated into the Internet of Things (IoT) are at the forefront of technological advancements …
integrated into the Internet of Things (IoT) are at the forefront of technological advancements …
CSI-otter: Isogeny-based (partially) blind signatures from the class group action with a twist
In this paper, we construct the first provably-secure isogeny-based (partially) blind signature
scheme. While at a high level the scheme resembles the Schnorr blind signature, our work …
scheme. While at a high level the scheme resembles the Schnorr blind signature, our work …
Short pairing-free blind signatures with exponential security
This paper proposes the first practical pairing-free three-move blind signature schemes that
(1) are concurrently secure,(2) produce short signatures (ie, three or four group …
(1) are concurrently secure,(2) produce short signatures (ie, three or four group …
: Privacy-Preserving Communication and Precise Reward Architecture for V2G Networks in Smart Grid
Vehicle-to-grid (V2G) networks are important components of the smart grid (SG) for their
capability of providing better ancillary services and facilitating the adoption of renewable …
capability of providing better ancillary services and facilitating the adoption of renewable …
Efficient blind and partially blind signatures without random oracles
T Okamoto - Theory of Cryptography Conference, 2006 - Springer
This paper proposes a new efficient signature scheme from bilinear maps that is secure in
the standard model (ie, without the random oracle model). Our signature scheme is more …
the standard model (ie, without the random oracle model). Our signature scheme is more …
Group signature schemes and payment systems based on the discrete logarithm problem
J Camenisch - 1998 - research-collection.ethz.ch
The security of many cryptographic systems relies on the difficulty of computing discrete
logarithms in certain finite groups. This dissertation studies existing cryptographic protocols …
logarithms in certain finite groups. This dissertation studies existing cryptographic protocols …
Providing privacy-aware incentives for mobile sensing
Mobile sensing exploits data contributed by mobile users (eg, via their smart phones) to
make sophisticated inferences about people and their surrounding and thus can be applied …
make sophisticated inferences about people and their surrounding and thus can be applied …
Round-optimal composable blind signatures in the common reference string model
M Fischlin - Annual International Cryptology Conference, 2006 - Springer
We build concurrently executable blind signatures schemes in the common reference string
model, based on general complexity assumptions, and with optimal round complexity …
model, based on general complexity assumptions, and with optimal round complexity …
A privacy protection scheme of microgrid direct electricity transaction based on consortium blockchain and continuous double auction
S Zhang, M Pu, B Wang, B Dong - IEEE access, 2019 - ieeexplore.ieee.org
Low cost, high efficiency, price transparency, and timely settlement of transactions are
required for direct transactions between electricity providers and consumers in the …
required for direct transactions between electricity providers and consumers in the …