Redactable Blockchain aims to ensure the immutability of the data of most applications and provide authorized mutability for some specific applications, such as for removing illegal content from blockchains. However, the existing Redactable Blockchains lack redacting efficiency and protection of the identity information of voters participating in the redacting consensus. To fill this gap, this paper presents an anonymous and efficient redactable blockchain scheme based on Proof-of-Work (PoW) in the permissionless setting, called “AeRChain”. Specifically, the paper first presents an improved Back’s Linkable Spontaneous Anonymous Group (bLSAG) signatures scheme and uses the improved scheme to hide the identity of blockchain voters. Then, in o...
Blockchain technology considers the central technology that is used within many applications used fr...
The continuous advancements of blockchain applications impose constant improvements on their technic...
Electronic voting has occupied a large part of the cryptographic protocols literature. The recent re...
Blockchain technologies have received a great amount of attention, and its immutability is paramount...
Internet-of-Things (IoT) envisions communications between heterogeneous devices and utilization of t...
Blockchain is a multiparty protocol to reach agreement on the order of events, and to record them co...
Notoriously, immutability is one of the most striking properties of blockchains. As the data contain...
Anonymity and privacy in the electoral process are mandatory features found in any democratic societ...
Applying consortium blockchain as a trust layer for heterogeneous industrial Internet-of-Things devi...
Blockchains combine other technologies, such as cryptography, networking, and incentive mechanisms, ...
The advances of artificial intelligence (AI) propels big data processing and transmission for Intern...
This paper defines a blockchain e-voting scheme to preserve voter-to-ballot unlinkability and voter-...
International audienceThe most fundamental purpose of blockchain technology is to enable persistent,...
At the heart of Blockchains is the trustless leader election mechanism for achieving consensus among...
With the rapid advancement and wide application of blockchain technology, blockchain consensus proto...
Blockchain technology considers the central technology that is used within many applications used fr...
The continuous advancements of blockchain applications impose constant improvements on their technic...
Electronic voting has occupied a large part of the cryptographic protocols literature. The recent re...
Blockchain technologies have received a great amount of attention, and its immutability is paramount...
Internet-of-Things (IoT) envisions communications between heterogeneous devices and utilization of t...
Blockchain is a multiparty protocol to reach agreement on the order of events, and to record them co...
Notoriously, immutability is one of the most striking properties of blockchains. As the data contain...
Anonymity and privacy in the electoral process are mandatory features found in any democratic societ...
Applying consortium blockchain as a trust layer for heterogeneous industrial Internet-of-Things devi...
Blockchains combine other technologies, such as cryptography, networking, and incentive mechanisms, ...
The advances of artificial intelligence (AI) propels big data processing and transmission for Intern...
This paper defines a blockchain e-voting scheme to preserve voter-to-ballot unlinkability and voter-...
International audienceThe most fundamental purpose of blockchain technology is to enable persistent,...
At the heart of Blockchains is the trustless leader election mechanism for achieving consensus among...
With the rapid advancement and wide application of blockchain technology, blockchain consensus proto...
Blockchain technology considers the central technology that is used within many applications used fr...
The continuous advancements of blockchain applications impose constant improvements on their technic...
Electronic voting has occupied a large part of the cryptographic protocols literature. The recent re...