Pub. online:19 Aug 2024Type:Research ArticleOpen Access
Journal:Informatica
Volume 35, Issue 3 (2024), pp. 601–616
Abstract
One of the main trends for the monitoring and control of business processes is to implement these processes via private blockchain systems. These systems must ensure data privacy and verifiability for the entire network here denoted by ‘Net’. In addition, every business activity should be declared to a trusted third party (TTP), such as an Audit Authority (AA), for tax declaration and collection purposes.
We present a solution for a confidential and verifiable realization of transactions based on the Unspent Transaction Output (UTxO) paradigm. This means that the total sum of transaction inputs (incomes) $In$ must be equal to the total sum of transaction outputs (expenses) $Ex$, satisfying the balance equation $In=Ex$. Privacy in a private blockchain must be achieved through the encryption of actual transaction values. However, it is crucial that all participants in the network be able to verify the validity of the transaction balance equation. This poses a challenge with probabilistically encrypted data. Moreover, the inputs and outputs are encrypted with different public keys. With the introduction of the AA, the number of different public keys for encryption can be reduced to two. Incomes are encrypted with the Receiver’s public key and expenses with the AA’s public key.
The novelty of our realization lies in taking additively-multiplicative, homomorphic ElGamal encryption and integrating it with a proposed paradigm of modified Schnorr identification providing a non-interactive zero-knowledge proof (NIZKP) using a cryptographically secure h-function. Introducing the AA as a structural element in a blockchain system based on the UTxO enables effective verification of encrypted transaction data for the Net. This is possible because the proposed NIZKP is able to prove the equivalency of two ciphertexts encrypted with two different public keys and different actors.
This integration allows all users on the Net to check the UTxO-based transaction balance equation on encrypted data. The security considerations of the proposed solution are presented.
Journal:Informatica
Volume 34, Issue 3 (2023), pp. 603–616
Abstract
The article presents the tax declaration scheme using blockchain confidential transactions based on the modified ElGamal encryption providing additively-homomorphic property. Transactions are based on the unspent transactions output (UTxO) paradigm allowing to effectively represent digital asset of cryptocurrencies in e-wallets and to perform financial operations. The main actors around transaction are specified, include money senders, receivers, transaction creator, Audit Authority (AA) and Net of users. A general transaction model with M inputs and N outputs is created, providing transaction amount confidentiality and verifiability for all actors with different levels of available information.
The transaction model allows Net to verify the validity of a transaction, having access only to encrypted transaction data. Each money receiver is able to decrypt and verify the actual sum that is transferred by the sender. AA is provided with actual transaction values and is able to supervise the tax payments for business actors. Such information allows to verify the honesty of transaction data for each user role.
The security analysis of the scheme is presented, referencing to ElGamal security assumptions. The coalition attack is formulated and prevention of this attack is proposed. It is shown that transaction creation is effective and requires almost the same resources as multiple ElGamal encryption. In addition to ElGamal encryption of all income and expenses, an additional exponentiation operation with small exponents, representing transferred sums, is needed. AA computation resources are slightly larger, since they have to be adequate for search procedures in the small range from 1 to ${2^{32}}-1=4294967295$ for individual money transfers.
Journal:Informatica
Volume 34, Issue 3 (2023), pp. 577–602
Abstract
Healthcare has seen many advances in sensor technology, but with recent improvements in networks and the addition of the Internet of Things, it is even more promising. Current solutions to managing healthcare data with cloud computing may be unreliable at the most critical moments. High response latency, large volumes of data, and security are the main issues of this approach. The promising solution is fog computing, which offers an immediate response resistant to disconnections and ways to process big data using real-time analytics and artificial intelligence (AI). However, fog computing has not yet matured and there are still many challenges. This article presents for a computer scientist a systematic review of the literature on fog computing in healthcare. Articles published in six years are analysed from the service, software, hardware, information technologies and mobility with autonomy perspectives. The contribution of this study includes an analysis of recent trends, focus areas and benefits of the use of AI techniques in fog computing e-health applications.
Pub. online:8 Feb 2021Type:Research ArticleOpen Access
Journal:Informatica
Volume 32, Issue 2 (2021), pp. 321–355
Abstract
Voting systems are as useful as people are willing to use them. Although many electronic election schemes have been proposed through the years, and some real case scenarios have been tested, people still do not trust electronic voting. Voting is not only about technological challenges but also about credibility, therefore, we propose a voting system focused on trust. We introduce political parties as active partners in the elections as a mechanism to encourage more traditional electors to participate. The system we propose here preserves elector’s privacy, it operates publicly through a blockchain and it is auditable by third parties.
Pub. online:20 Nov 2020Type:Research ArticleOpen Access
Journal:Informatica
Volume 32, Issue 2 (2021), pp. 397–424
Abstract
Blockchain is a decentralized database, which can protect the safety of trade and avoid double payment. Due to the widespread attention of researchers, the studies of this field have increased sharply in recent years. It is meaningful to reveal the development level and trends based on this literature. This paper adopts bibliometric methods to study the collaboration characteristics from the levels of author, institution and country. Furthermore, several kinds of collaboration networks and their centrality analysis are also presented, which not only display the development level and collaboration degree but also the evolution of author collaboration modes in different phases.