{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T04:18:54Z","timestamp":1741753134887,"version":"3.38.0"},"reference-count":38,"publisher":"SAGE Publications","issue":"2","license":[{"start":{"date-parts":[[2021,2,11]],"date-time":"2021-02-11T00:00:00Z","timestamp":1613001600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Computer Security"],"published-print":{"date-parts":[[2021,3,29]]},"abstract":"<jats:p> This work formalizes Publicly Auditable Conditional Blind Signatures (PACBS), a new cryptographic primitive that allows the verifiable issuance of blind signatures, the validity of which is contingent upon a predicate and decided by a designated verifier. In particular, when a user requests the signing of a message, blinded to protect her privacy, the signer embeds data in the signature that makes it valid if and only if a condition holds. A verifier, identified by a private key, can check the signature and learn the value of the predicate. Auditability mechanisms in the form of non-interactive zero-knowledge proofs are provided, so that a cheating signer cannot issue arbitrary signatures and a cheating verifier cannot ignore the embedded condition. The security properties of this new primitive are defined using cryptographic games. A proof-of-concept construction, based on the Okamoto\u2013Schnorr blind signatures infused with a plaintext equivalence test is presented and its security is analyzed. <\/jats:p>","DOI":"10.3233\/jcs-181270","type":"journal-article","created":{"date-parts":[[2021,2,14]],"date-time":"2021-02-14T03:42:18Z","timestamp":1613274138000},"page":"229-271","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":1,"title":["Publicly auditable conditional blind signatures"],"prefix":"10.1177","volume":"29","author":[{"given":"Panagiotis","family":"Grontas","sequence":"first","affiliation":[{"name":"School of Electrical and Computer Engineering, National Technical University of Athens, Greece. E-mails:\u00a0,\u00a0,\u00a0"}]},{"given":"Aris","family":"Pagourtzis","sequence":"additional","affiliation":[{"name":"School of Electrical and Computer Engineering, National Technical University of Athens, Greece. E-mails:\u00a0,\u00a0,\u00a0"}]},{"given":"Alexandros","family":"Zacharakis","sequence":"additional","affiliation":[{"name":"School of Electrical and Computer Engineering, National Technical University of Athens, Greece. E-mails:\u00a0,\u00a0,\u00a0"}]},{"given":"Bingsheng","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Zhejiang University, China. E-mail:\u00a0"}]}],"member":"179","published-online":{"date-parts":[[2021,2,11]]},"reference":[{"key":"ref001","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44598-6_17"},{"key":"ref002","unstructured":"R.\u00a0Ara\u00fajo, S.\u00a0Foulle and J.\u00a0Traor\u00e9, A practical and secure coercion-resistant scheme for remote elections, in: Frontiers of Electronic Voting, 29.07.\u201303.08.2007, D.\u00a0Chaum, M.\u00a0Kutylowski, R.L.\u00a0Rivest and P.Y.A.\u00a0Ryan, eds, Dagstuhl Seminar Proceedings, Vol.\u00a007311, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany, 2007, http:\/\/drops.dagstuhl.de\/opus\/volltexte\/2008\/1295."},{"key":"ref003","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17619-7_20"},{"key":"ref004","unstructured":"F.\u00a0Benhamouda, T.\u00a0Lepoint, J.\u00a0Loss, M.\u00a0Orr\u00f9 and M.\u00a0Raykova, 2020, On the (in)security of ROS, https:\/\/eprint.iacr.org\/2020\/945."},{"key":"ref005","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054851"},{"key":"ref006","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"ref007","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0053427"},{"key":"ref008","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34805-0_20"},{"key":"ref009","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48071-4_7"},{"key":"ref010","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46416-6_22"},{"key":"ref011","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27576-0_4"},{"key":"ref012","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48658-5_19"},{"key":"ref013","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47721-7_12"},{"key":"ref014","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-57220-1_66"},{"key":"ref015","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"ref016","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1999.1689"},{"key":"ref017","doi-asserted-by":"publisher","DOI":"10.1109\/ISPAN-FCST-ISCC.2017.79"},{"key":"ref018","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-58820-8_15"},{"key":"ref019","doi-asserted-by":"publisher","DOI":"10.1007\/11496137_32"},{"key":"ref020","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.31"},{"key":"ref021","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44448-3_13"},{"key":"ref022","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68339-9_13"},{"key":"ref023","doi-asserted-by":"publisher","DOI":"10.1145\/1102199.1102213"},{"key":"ref024","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0052233"},{"key":"ref025","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.32"},{"key":"ref026","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73549-6_116"},{"key":"ref027","doi-asserted-by":"publisher","DOI":"10.1007\/11523468_38"},{"key":"ref028","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48071-4_3"},{"key":"ref029","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0028168"},{"key":"ref030","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0034852"},{"key":"ref031","doi-asserted-by":"publisher","DOI":"10.1007\/s001450010003"},{"key":"ref032","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_32"},{"key":"ref033","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32747-6_5"},{"key":"ref034","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196725"},{"key":"ref035","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45600-7_1"},{"key":"ref036","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30057-8_39"},{"key":"ref037","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27576-0_15"},{"key":"ref038","unstructured":"A.\u00a0Zacharakis, P.\u00a0Grontas and A.\u00a0Pagourtzis, Conditional Blind Signatures, Short version presented in 7th International Conference on Algebraic Informatics\u00a0\u2013 CAI 2017, (2017), 682, IACR eprint report 2017\/682, http:\/\/eprint.iacr.org\/2017\/682."}],"container-title":["Journal of Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JCS-181270","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JCS-181270","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JCS-181270","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T05:55:45Z","timestamp":1741672545000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JCS-181270"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,11]]},"references-count":38,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,3,29]]}},"alternative-id":["10.3233\/JCS-181270"],"URL":"https:\/\/doi.org\/10.3233\/jcs-181270","relation":{},"ISSN":["0926-227X","1875-8924"],"issn-type":[{"type":"print","value":"0926-227X"},{"type":"electronic","value":"1875-8924"}],"subject":[],"published":{"date-parts":[[2021,2,11]]}}}