Loading [MathJax]/jax/element/mml/optable/MathOperators.js
Research article Special Issues

BPA: A decentralized payment system that balances privacy and auditability

  • Received: 09 November 2023 Revised: 03 January 2024 Accepted: 12 January 2024 Published: 02 February 2024
  • MSC : 94A62, 91B99

  • The rapid development of blockchain transactions highlights the importance of privacy protection (including anonymity and confidentiality) and underscores the necessity for auditability. Some schemes, such as PGC and Miniledger, support privacy protection and auditability. However, they only offer incomplete privacy protection (i.e., supporting anonymity or confidentiality exclusively). In response to these issues, we propose a scheme that achieves partial anonymity, confidentiality, auditability, and traceability. By integrating a variant of Pedersen commitments and randomizable signatures, we achieve partial anonymity for users and the auditability of transactions, thereby protecting user privacy under audit conditions. Based on the twisted ElGamal encryption algorithm and specially constructed zero-knowledge proofs, we achieve confidentiality of transaction amounts under legal and regulatory conditions. System test results indicate that this scheme effectively meets the above requirements. The feasibility of this scheme is confirmed through system testing, comparative analysis, and security analysis.

    Citation: Le Gao, Junzhe Zhang, Jiaxin Yu, Yin Tang, Zhiqiang Zeng. BPA: A decentralized payment system that balances privacy and auditability[J]. AIMS Mathematics, 2024, 9(3): 6183-6206. doi: 10.3934/math.2024302

    Related Papers:

    [1] Maryam AlKandari . Nonlinear differential equations with neutral term: Asymptotic behavior of solutions. AIMS Mathematics, 2024, 9(12): 33649-33661. doi: 10.3934/math.20241606
    [2] Taher S. Hassan, Emad R. Attia, Bassant M. El-Matary . Iterative oscillation criteria of third-order nonlinear damped neutral differential equations. AIMS Mathematics, 2024, 9(8): 23128-23141. doi: 10.3934/math.20241124
    [3] Zuhur Alqahtani, Insaf F. Ben Saud, Areej Almuneef, Belgees Qaraad, Higinio Ramos . New criteria for the oscillation of a class of third-order quasilinear delay differential equations. AIMS Mathematics, 2025, 10(2): 4205-4225. doi: 10.3934/math.2025195
    [4] M. Sathish Kumar, V. Ganesan . Asymptotic behavior of solutions of third-order neutral differential equations with discrete and distributed delay. AIMS Mathematics, 2020, 5(4): 3851-3874. doi: 10.3934/math.2020250
    [5] A. A. El-Gaber, M. M. A. El-Sheikh, M. Zakarya, Amirah Ayidh I Al-Thaqfan, H. M. Rezk . On the oscillation of solutions of third-order differential equations with non-positive neutral coefficients. AIMS Mathematics, 2024, 9(11): 32257-32271. doi: 10.3934/math.20241548
    [6] Lin Fan, Shunchu Li, Dongfeng Shao, Xueqian Fu, Pan Liu, Qinmin Gui . Elastic transformation method for solving the initial value problem of variable coefficient nonlinear ordinary differential equations. AIMS Mathematics, 2022, 7(7): 11972-11991. doi: 10.3934/math.2022667
    [7] Yibing Sun, Yige Zhao . Oscillatory and asymptotic behavior of third-order neutral delay differential equations with distributed deviating arguments. AIMS Mathematics, 2020, 5(5): 5076-5093. doi: 10.3934/math.2020326
    [8] Ahmed M. Hassan, Clemente Cesarano, Sameh S. Askar, Ahmad M. Alshamrani . Oscillatory behavior of solutions of third order semi-canonical dynamic equations on time scale. AIMS Mathematics, 2024, 9(9): 24213-24228. doi: 10.3934/math.20241178
    [9] Pengshe Zheng, Jing Luo, Shunchu Li, Xiaoxu Dong . Elastic transformation method for solving ordinary differential equations with variable coefficients. AIMS Mathematics, 2022, 7(1): 1307-1320. doi: 10.3934/math.2022077
    [10] Ali Muhib, Hammad Alotaibi, Omar Bazighifan, Kamsing Nonlaopon . Oscillation theorems of solution of second-order neutral differential equations. AIMS Mathematics, 2021, 6(11): 12771-12779. doi: 10.3934/math.2021737
  • The rapid development of blockchain transactions highlights the importance of privacy protection (including anonymity and confidentiality) and underscores the necessity for auditability. Some schemes, such as PGC and Miniledger, support privacy protection and auditability. However, they only offer incomplete privacy protection (i.e., supporting anonymity or confidentiality exclusively). In response to these issues, we propose a scheme that achieves partial anonymity, confidentiality, auditability, and traceability. By integrating a variant of Pedersen commitments and randomizable signatures, we achieve partial anonymity for users and the auditability of transactions, thereby protecting user privacy under audit conditions. Based on the twisted ElGamal encryption algorithm and specially constructed zero-knowledge proofs, we achieve confidentiality of transaction amounts under legal and regulatory conditions. System test results indicate that this scheme effectively meets the above requirements. The feasibility of this scheme is confirmed through system testing, comparative analysis, and security analysis.



    A function f is said to be completely monotonic on an interval I if f has derivatives of all orders on I and 0(1)k1f(k1)(x)< for xI and kN, where f(0)(x) means f(x) and N is the set of all positive integers. See [1,2,3]. Theorem 12b in [3] states that a necessary and sufficient condition for a function f to be completely monotonic on the infinite interval (0,) is that the integral f(t)=0etsdτ(s) converges for s(0,), where τ(s) is nondecreasing on (0,). In other words, a function is completely monotonic on (0,) if and only if it is a Laplace transform of a nonnegative measure. This is one of many reasons why many mathematicians have been investigating completely monotonic functions for many decades.

    Definition 1.1 ([4,5,6,7,8,9]). Let f(x) be a completely monotonic function on (0,) and denote f()=limxf(x). If for some rR the function xr[f(x)f()] is completely monotonic on (0,) but xr+ε[f(x)f()] is not for any positive number ε>0, then we say that the number r is completely monotonic degree of f(x) with respect to x(0,); if for all rR each and every xr[f(x)f()] is completely monotonic on (0,), then we say that completely monotonic degree of f(x) with respect to x(0,) is .

    The notation degdegxcm[f(x)] has been designed in [4] to denote completely monotonic degree r of f(x) with respect to x(0,). It is clear that completely monotonic degree degdegxcm[f(x)] of any completely monotonic function f(x) with respect to x(0,) is at leat 0. It was proved in [6] that completely monotonic degree degdegxcm[f(x)] equals if and only if f(x) is nonnegative and identically constant. This definition slightly modifies the corresponding one stated in [4] and related references therein. For simplicity, in what follows, we sometimes just say that degdegxcm[f(x)] is completely monotonic degree of f(x).

    Why do we compute completely monotonic degrees? One can find simple but significant reasons in the second paragraph of [7] or in the papers [10,11,12,13] and closely related references therein. Completely monotonic degree is a new notion introduced in very recent years. See [4,6,9,11,12,14,15,16,17,18,19,20,21,22] and closely related references. This new notion can be used to more accurately measure and differentiate complete monotonicity. For example, the functions 1xα and 1xβ for α,β>0 and αβ are both completely monotonic on (0,), but they are different completely monotonic functions. How to quantitatively measure their differences? How to quantitatively differentiate them from each other? The notion of completely monotonic degrees can be put to good use: The completely monotonic degrees of 1xα and 1xβ with respect to x(0,) for α,β>0 and αβ are α and β respectively.

    The classical Euler's gamma function Γ(x) can be defined for x>0 by Γ(x)=0tx1etdt. The logarithmic derivative of Γ(x), denoted by ψ(x)=Γ(x)Γ(x), is called the psi or digamma function, the derivatives ψ(x) and ψ(x) are respectively called the tri- and tetragamma functions. As a whole, the derivatives ψ(k)(x) for k0 are called polygamma functions. For new results on Γ(z) and ψ(k)(x) in recent years, please refer to [7,11,23,24,25,26,27,28,29] and closely related references therein.

    Why do we still study the gamma and polygamma functions Γ(z) and ψ(k)(z) for k0 nowadays? Because this kind of functions are not elementary and are the most applicable functions in almost all aspects of mathematics and mathematical sciences.

    Let

    Ψ(x)=[ψ(x)]2+ψ(x),x(0,). (2.1)

    In [30], it was established that the inequality

    Ψ(x)>p(x)900x4(x+1)10 (2.2)

    holds for x>0, where

    p(x)=75x10+900x9+4840x8+15370x7+31865x6+45050x5+44101x4+29700x3+13290x2+3600x+450.

    It is clear that the inequality

    Ψ(x)>0 (2.3)

    for x>0 is a weakened version of the inequality (2.2). This inequality was deduced and recovered in [31,32]. The inequality (2.3) was also employed in [31,32,33,34]. This inequality has been generalized in [33,35,36,37]. For more information about the history and background of this topic, please refer to the expository and survey articles [11,38,39,40,41] and plenty of references therein.

    In the paper [42], it was proved that, among all functions [ψ(m)(x)]2+ψ(n)(x) for m,nN, only the function Ψ(x) is nontrivially completely monotonic on (0,).

    In [43,44], the functions

    x+1212x4(x+1)Ψ(x),Ψ(x)x2+1212x4(x+1)2,Ψ(x)p(x)900x4(x+1)10

    were proved to be completely monotonic on (0,). From this, we obtain

    max{x2+1212x4(x+1)2,p(x)900x4(x+1)10}<Ψ(x)<x+1212x4(x+1) (2.4)

    for x>0. In [45], the function

    hλ(x)=Ψ(x)x2+λx+1212x4(x+1)2 (2.5)

    was proved to be completely monotonic on (0,) if and only if λ0, and so is hλ(x) if and only if λ4; Consequently, the double inequality

    x2+μx+1212x4(x+1)2<Ψ(x)<x2+νx+1212x4(x+1)2 (2.6)

    holds on (0,) if and only if μ0 and ν4. The inequality (2.6) refines and sharpens the right-hand side inequality in (2.4).

    It was remarked in [40] that a divided difference version of the inequality (2.3) has been implicitly obtained in [46]. The divided difference form of the function Ψ(x) and related functions have been investigated in the papers [47,48,49,50,51] and closely related references therein. There is a much complete list of references in [52].

    In [14,16], among other things, it was deduced that the functions x2Ψ(x) and x3Ψ(x) are completely monotonic on (0,). Equivalently,

    degdegxcm[Ψ(x)]2anddegdegxcm[Ψ(x)]3. (2.7)

    Motivated by these results, we naturally pose the following two questions:

    1. is the function x4Ψ(x) completely monotonic on (0,)?

    2. is α4 the necessary and sufficient condition for the function xαΨ(x) to be completely monotonic on (0,)?

    In other words, is the constant 4 completely monotonic degree of Ψ(x) with respect to x(0,)?

    In order to affirmatively and smoothly answer the above questions, we need five lemmas below.

    Lemma 3.1 ([29]). For nN and x>0,

    ψ(n)(x)=(1)n+10tn1etextdt. (3.1)

    Lemma 3.2 ([3,29]). Let fi(t) for i=1,2 be piecewise continuous in arbitrary finite intervals included in (0,) and suppose that there exist some constants Mi>0 and ci0 such that |fi(t)|Miecit for i=1,2. Then

    0[t0f1(u)f2(tu)du]estdt=0f1(u)esudu0f2(v)esvdv. (3.2)

    Lemma 3.3 ([53]). Let f(x,t) is differentiable in t and continuous for (x,t)R2. Then

    ddttx0f(x,t)dx=f(t,t)+tx0f(x,t)tdx.

    Lemma 3.4 ([54,55,56]). If fi for 1in are nonnegative Lebesgue square integrable functions on [0,a) for all a>0, then

    f1fn(x)xn1(n1)!exp[n1xn1x0(xu)n2nj=1lnfj(u)du] (3.3)

    for all n2 and x0, where fifj(x) denotes the convolution x0fi(t)fj(xt)dt.

    Lemma 3.5 ([29]). As z in |argz|<π,

    ψ(z)1z+12z2+16z3130z5+142z7130z9+,ψ(z)1z21z312z4+16z616z8+310z1056z12+,ψ(3)(z)2z3+3z4+2z51z7+43z93z11+10z13.

    The formulas listed in Lemma 3.5 are special cases of [29].

    Now we are in a position to compute completely monotonic degree of the function Ψ(x).

    Theorem 4.1. Completely monotonic degree of Ψ(x) defined by (2.1) with respect to x(0,) is 4. In other words,

    degdegxcm[Ψ(x)]=4. (4.1)

    Proof. Using the integral representation (3.1) and the formula (3.2) gives

    Ψ(x)=[0t1etextdt]20t21etextdt=0[t0s(ts)(1es)[1e(ts)]dst21et]extdt=0q(t)extdt,

    where

    q(t)=t0σ(s)σ(ts)dstσ(t)andσ(s)={s1es,s01,s=0. (4.2)

    Direct calculations reveal

    σ(s)=1+1ses1s(es1)2,σ(s)=s2es1+3s2(es1)2+2s(es1)3,σ(3)(s)=3ses1+97s(es1)26(2s1)(es1)36s(es1)4,σ(4)(s)=s4es1+15s28(es1)2+2(25s24)(es1)3+12(5s2)(es1)4+24s(es1)5,σ(5)(s)=5ses1+7531s(es1)210(18s25)(es1)330(13s10)(es1)4120(3s1)(es1)5120s(es1)6,σ(6)(s)=s6es1+3(21s62)(es1)2+2(301s540)(es1)3+60(35s39)(es1)4+240(14s9)(es1)5+360(7s2)(es1)6+720s(es1)7,

    and

    σ(0)=1,σ(0)=12,σ(0)=16,σ(3)(0)=0,σ(4)(0)=130,σ(5)(0)=0,σ(6)(0)=142.

    Further differentiating consecutively brings out

    \begin{align*} [\ln\sigma''(s)]'& = -\frac{(s-3)e^{2 s} +4s e^s +s+3}{[(s-2)e^s+s+2](e^s-1)},\\ [\ln\sigma''(s)]''& = -\frac{e^{4s}-4(s^2-3s+4)e^{3 s}-(4 s^2-30)e^{2 s}-4(s^2+3s+4)e^s+1}{(e^s-1)^2[(s-2)e^s+s+2]^2}\\ &\triangleq-\frac{h_1(s)}{(e^s-1)^2[(s-2)e^s+s+2]^2},\\ h_1'(s)& = 4[e^{3 s}-(3 s^2-7 s+9)e^{2 s}-(2 s^2+2s-15)e^s-s^2-5 s-7]e^s\\ &\triangleq4h_2(s)e^s,\\ h_2'(s)& = 3 e^{3 s}- (6s^2-8 s+11)e^{2 s}-(2 s^2+6 s-13)e^s -2s-5,\\ h_2''(s)& = 9e^{3 s}-2 (6 s^2-2 s+7) e^{2 s}- (2 s^2+10 s-7)e^s-2,\\ h_2^{(3)}(s)& = [27 e^{2s}-8 e^s (3 s^2+2 s+3)-2 s^2-14 s-3]e^s\\ &\triangleq h_3(s)e^s,\\ h_3'(s)& = 54 e^{2 s}-8 (3 s^2+8 s+5) e^s-2 (2s+7),\\ h_3''(s)& = 4[27 e^{2 s}-2 (3 s^2+14 s+13) e^s-1],\\ h_3^{(3)}(s)& = 8 (27 e^s-3 s^2-20 s-27)e^s \\ & \gt 0 \end{align*}

    for s\in(0, \infty) , and

    \begin{equation*} h_3''(0) = h_3'(0) = h_3(0) = h_2^{(3)}(0) = h_2''(0) = h_2'(0) = h_2(0) = h_1'(0) = h_1(0) = 0. \end{equation*}

    This means that

    \begin{gather*} h_3''(s) \gt 0,\quad h_3'(s) \gt 0,\quad h_3(s) \gt 0,\quad h_2^{(3)}(s) \gt 0,\\ h_2''(s) \gt 0,\quad h_2'(s) \gt 0,\quad h_2(s) \gt 0,\quad h_1'(s) \gt 0,\quad h_1(s) \gt 0 \end{gather*}

    for s\in(0, \infty) . Therefore, the derivative [\ln\sigma''(s)]'' is negative, that is, the function \sigma''(s) is logarithmically concave, on (0, \infty) . Hence, for any given number t > 0 ,

    1. the function \sigma''(s)\sigma''(t-s) is also logarithmically concave with respect to s\in(0, t) ;

    2. the function \sigma''(s) is decreasing and \sigma(s) is not concave on (0, \infty) .

    By Lemma 3.3 and integration-by-part, straightforward computations yield

    \begin{align*} q'(t)& = \int_0^t\sigma(s)\sigma'(t-s){\rm{d}} s+\sigma(0)\sigma(t)-[t\sigma'(t)+\sigma(t)]\\ & = \int_0^t\sigma(s)\sigma'(t-s){\rm{d}} s-t\sigma'(t),\\ q''(t)& = \int_0^t\sigma(s)\sigma''(t-s){\rm{d}} s+\sigma(t)\sigma'(0)-[\sigma'(t)+t\sigma''(t)]\\ & = -\int_0^t\sigma(s)\frac{{\rm{d}} \sigma'(t-s)}{{\rm{d}} s}{\rm{d}} s+\sigma(t)\sigma'(0)-[\sigma'(t)+t\sigma''(t)]\\ & = \int_0^t\sigma'(s)\sigma'(t-s){\rm{d}} s-t\sigma''(t),\\ q^{(3)}(t)& = \int_0^t\sigma'(s)\sigma''(t-s){\rm{d}} s +\frac12\sigma'(t)-\sigma''(t)-t\sigma^{(3)}(t),\\ q^{(4)}(t)& = \int_0^t\sigma'(s)\sigma^{(3)}(t-s){\rm{d}} s+\frac16\sigma'(t) +\frac12\sigma''(t)-2\sigma^{(3)}(t)-t\sigma^{(4)}(t)\\ & = -\int_0^t\sigma'(s)\frac{{\rm{d}} \sigma''(t-s)}{{\rm{d}} s}{\rm{d}} s+\frac16\sigma'(t) +\frac12\sigma''(t)-2\sigma^{(3)}(t)-t\sigma^{(4)}(t)\\ & = \int_0^t\sigma''(s)\sigma''(t-s){\rm{d}} s +\sigma''(t)-2\sigma^{(3)}(t)-t\sigma^{(4)}(t)\\ & = 2\int_0^{t/2}\sigma''(s)\sigma''(t-s){\rm{d}} s +\sigma''(t)-2\sigma^{(3)}(t)-t\sigma^{(4)}(t), \end{align*}

    and

    \begin{equation*} q(0) = q'(0) = q''(0) = 0, \quad q^{(3)}(0) = \frac1{12}, \quad q^{(4)}(0) = \frac16. \end{equation*}

    Applying Lemma 3.4 to f_1 = f_2 = \sigma'' and n = 2 leads to

    \begin{equation*} \int_0^t\sigma''(s)\sigma''(t-s){\rm{d}} s \ge t \exp\biggl[\frac2t\int_0^t\ln \sigma''(u){\rm{d}} u\biggr]. \end{equation*}

    Hence, the validity of the inequality

    \begin{equation} t \exp\biggl[\frac2t\int_0^t\ln \sigma''(u){\rm{d}} u\biggr] +\sigma''(t)-2\sigma^{(3)}(t)-t\sigma^{(4)}(t) \gt 0 \end{equation} (4.3)

    implies the positivity of q^{(4)}(t) on (0, \infty) .

    When t\sigma^{(4)}(t)+2\sigma^{(3)}(t)-\sigma''(t)\le0 , the inequality (4.3) is clearly valid.

    When t\sigma^{(4)}(t)+2\sigma^{(3)}(t)-\sigma''(t) > 0 , the inequality (4.3) can be rearranged as

    \begin{equation*} \int_0^t\ln \sigma''(u){\rm{d}} u \gt \frac{t}2\ln\frac{t\sigma^{(4)}(t)+2\sigma^{(3)}(t)-\sigma''(t)}t\;. \end{equation*}

    Let

    \begin{equation*} F(t) = \int_0^t\ln \sigma''(u){\rm{d}} u-\frac{t}2\ln\frac{t\sigma^{(4)}(t)+2\sigma^{(3)}(t)-\sigma''(t)}t\;. \end{equation*}

    Differentiating twice produces

    \begin{equation*} F'(t) = \ln \sigma''(t)-\frac12\ln\frac{t\sigma^{(4)}(t)+2\sigma^{(3)}(t)-\sigma''(t)}t -\frac{t^2\sigma^{(5)}(t)+2t\sigma^{(4)}(t)-(t+2)\sigma^{(3)}(t)+\sigma''(t)} {2[t\sigma^{(4)}(t)+2\sigma^{(3)}(t)-\sigma''(t)]} \end{equation*}

    and

    \begin{align*} F''(t)& = \frac{\sigma^{(3)}(t)}{\sigma''(t)}-\frac{t^2\sigma^{(5)}(t) +2t\sigma^{(4)}(t)-(t+2)\sigma^{(3)}(t)+\sigma''(t)} {2t[t\sigma^{(4)}(t)+2\sigma^{(3)}(t)-\sigma''(t)]} \\ &\quad-\frac1{2[t\sigma^{(4)}(t)+2\sigma^{(3)}(t)-\sigma''(t)]^2} \left(\begin{gathered} \bigl[t^2\sigma^{(6)}(t)+4t\sigma^{(5)}(t)-t\sigma^{(4)}(t)\bigr]\bigl[t\sigma^{(4)}(t)\\ +2\sigma^{(3)}(t)-\sigma''(t)\bigr]-\bigl[t^2\sigma^{(5)}(t)\\ +2t\sigma^{(4)}(t)-(t+2)\sigma^{(3)}(t)+\sigma''(t)\bigr]\\ \times\bigl[t\sigma^{(5)}(t)+3\sigma^{(4)}(t)-\sigma^{(3)}(t)\bigr] \end{gathered}\right)\\ &\triangleq\frac{Q(t)}{2t\sigma''(t)[t\sigma^{(4)}(t)+2\sigma^{(3)}(t)-\sigma''(t)]^2}, \end{align*}

    where

    \begin{align*} Q(t)& = 2t\sigma^{(3)}(t)\bigl[t\sigma^{(4)}(t)+2\sigma^{(3)}(t)-\sigma''(t)\bigr]^2 -\sigma''(t)\bigl[t\sigma^{(4)}(t)+2\sigma^{(3)}(t)-\sigma''(t)\bigr]\bigl[t^2\sigma^{(5)}(t) +2t\sigma^{(4)}(t)\\ &\quad-(t+2)\sigma^{(3)}(t)+\sigma''(t)\bigr]-t\sigma''(t)\Bigl\{\bigl[t^2\sigma^{(6)}(t) +4t\sigma^{(5)}(t) -t\sigma^{(4)}(t)\bigr] \bigl[t\sigma^{(4)}(t)+2\sigma^{(3)}(t)-\sigma''(t)\bigr]\\ &\quad -\bigl[t^2\sigma^{(5)}(t)+2t\sigma^{(4)}(t) -(t+2)\sigma^{(3)}(t)+\sigma''(t)\bigr]\bigl[t\sigma^{(5)}(t) +3\sigma^{(4)}(t)-\sigma^{(3)}(t)\bigr]\Bigr\}\\ &\triangleq \frac{e^{3 t}R(t)}{(e^t-1)^{15}} \end{align*}

    and

    \begin{align*} R(t)& = e^{9 t} \bigl(t^5-12 t^4+70 t^3-160 t^2+192 t-128\bigr)-e^{8 t} \bigl(16 t^7-220 t^6+1219 t^5-3220 t^4\\ &\quad+4490 t^3-3248 t^2+1152 t-768\bigr)-4 e^{7 t} \bigl(37 t^7-423 t^6+1397 t^5-1409 t^4\\ &\quad-1020 t^3+2632 t^2-732 t+456\bigr)-4 e^{6 t} \bigl(225 t^7-1281 t^6+1213 t^5+3127 t^4\\ &\quad-4372 t^3-2648 t^2+1020 t-504\bigr)-2 e^{5 t} \bigl(908 t^7-1514 t^6-6493 t^5+8710 t^4\\ &\quad+12754 t^3-1216 t^2-1656 t+336\bigr)-2 e^{4 t} \bigl(908 t^7+1710 t^6-5489 t^5-12370 t^4\\ &\quad+594 t^3+4880 t^2+696 t+336\bigr)-4 e^{3 t} \bigl(225 t^7+1263 t^6+1771 t^5-887 t^4-3208 t^3\\ &\quad-728 t^2+12 t-168\bigr)-4 e^{2 t} \bigl(37 t^7+353 t^6+1099 t^5+1337 t^4+272 t^3-632 t^2\\ &\quad-108 t+24\bigr)-e^t \bigl(16 t^7+180 t^6+827 t^5+1864 t^4+2226 t^3+1312 t^2+240 t+96\bigr)\\ &\quad+t^5+8 t^4+30 t^3 +48 t^2+48 t+32. \end{align*}

    Differentiating and taking the limit t\to0 about 76 times respectively by the same approach as either the proof of the positivity of \theta(t) in [43], or proofs of the absolute monotonicity of the functions f_1, f_2, f_3 and h_1, h_2, h_3, h_4 in [57], or the proof of the positivity of h_1(s) on page 3396 in this paper, we can verify the positivity of R(t) on (0, \infty) . In [58], a stronger conclusion than the positivity of R(t) on (0, \infty) was proved in details. This means that Q(t) > 0 on (0, \infty) and F''(t) > 0 . Accordingly, the derivative F'(t) is strictly increasing. Because

    \begin{align*} F'(8)& = 4+\frac{3 (6 e^{32}+729 e^{24}+2825 e^{16}+1483 e^8+77)}{8 e^{32}+270 e^{24}+150 e^{16}-374 e^8-54}\\ &\quad+\frac12\ln \frac{8(5+3 e^8)}{(e^8-1)(27+214 e^8+139 e^{16}+4 e^{24})}\\ & = -0.24428\dotsc \end{align*}

    and

    \begin{align*} F'(10)& = 5+\frac{72 e^{40}+4715 e^{30}+16563 e^{20}+8241 e^{10}+409}{19 e^{40}+440 e^{30}+186 e^{20}-568 e^{10}-77}\\ &\quad +\frac12\ln\frac{80(3+2 e^{10})^2}{(e^{10}-1)(77+645 e^{10}+459 e^{20}+19 e^{30})}\\ & = 0.20823\dotsc, \end{align*}

    which are numerically calculated with the help of the software MATHEMATICA, the unique zero of F'(t) locates on the open interval (8, 10) . Consequently, the unique minimum of the function F(t) attains on the interval (8, 10) . Since

    \begin{equation*} F(t) = F(t_0)+(t-t_0)F'(t_0)+\frac{(t-t_0)^2}2F''(\xi) \gt F(t_0)+(t-t_0)F'(t_0) \end{equation*}

    for t, t_0\in[8, 10] , where \xi locates between t_0 and t , numerically calculating with the help of the software MATHEMATICA gains

    \begin{align*} 2F(t)& \gt [F(8)+(t-8)F'(8)]+[F(10)+(t-10)F'(10)]\\ & = F(8)+F(10)-[8F'(8)+10F'(10)]+[F'(8)+F'(10)]t\\ & \gt \int_0^8 \ln\sigma''(u){\rm{d}} u-4 \ln\frac{e^8 (27+214 e^8+139 e^{16}+4 e^{24})}{2 (e^8-1)^5}+\int_0^{10} \ln\sigma''(u){\rm{d}} u\\ &\quad-5 \ln\frac{e^{10} (77+645 e^{10}+459 e^{20}+19 e^{30})}{5 (e^{10}-1)^5} -0.1281-0.0361t\\ & \gt \int_0^8 \ln\sigma''(u){\rm{d}} u+\int_0^{10} \ln\sigma''(u){\rm{d}} u+72.492 -0.1281-0.361\\ & \gt \int_0^8 \ln\sigma''(u){\rm{d}} u+\int_0^{10} \ln\sigma''(u){\rm{d}} u+72\\ & \gt \frac13\Biggl[\sum\limits_{k = 1}^{24}\ln\sigma''\biggl(\frac{k}3\biggr) +\sum\limits_{k = 1}^{30}\ln\sigma''\biggl(\frac{k}3\biggr)\Biggr]+72\\ & \gt -29-43+72\\ & = 0 \end{align*}

    on the interval [8, 10] . In conclusion, the inequality (4.3) is valid and the fourth derivative q^{(4)}(t) is positive on (0, \infty) .

    Integrating by parts successively results in

    \begin{gather*} x^4\Psi(x) = x^4\int_0^\infty q(t)e^{-xt}{\rm{d}} t = -x^3\int_0^\infty q(t)\frac{{\rm{d}} e^{-xt}}{{\rm{d}} t}{\rm{d}} t = -x^3\biggl[q(t)e^{-xt}\big|_{t = 0}^{t = \infty}-\int_0^\infty q'(t)e^{-xt}{\rm{d}} t\biggr]\\ = x^3\int_0^\infty q'(t)e^{-xt}{\rm{d}} t = x^2\int_0^\infty q''(t)e^{-xt}{\rm{d}} t = x\int_0^\infty q^{(3)}(t)e^{-xt}{\rm{d}} t = -\int_0^\infty q^{(3)}(t)\frac{{\rm{d}} e^{-xt}}{{\rm{d}} t}{\rm{d}} t\\ = -\biggl[q^{(3)}(t)e^{-xt}\big|_{t = 0}^{t = \infty} -\int_0^\infty q^{(4)}(t)\frac{{\rm{d}} e^{-xt}}{{\rm{d}} t}{\rm{d}} t\biggr] = \frac1{12}+\int_0^\infty q^{(4)}(t)e^{-xt}{\rm{d}} t. \end{gather*}

    From the positivity of q^{(4)}(t) on (0, \infty) , it follows that the function x^4\Psi(x) is completely monotonic on (0, \infty) . In other words,

    \begin{equation} \sideset{}{{}_\mathrm{cm}^{{x}}}\deg[\Psi(x)]\ge4. \end{equation} (4.4)

    Suppose that the function

    \begin{equation*} f_\alpha(x) = x^\alpha \Psi(x) \end{equation*}

    is completely monotonic on (0, \infty) . Then

    \begin{equation*} f_\alpha'(x) = x^{\alpha-1} \bigl\{\alpha \Psi(x) +x\bigl[2\psi'(x)\psi''(x)+\psi^{(3)}(x)\bigr]\bigr\}\le0 \end{equation*}

    on (0, \infty) , that is,

    \begin{equation*} \alpha \le-\frac{x\bigl[2\psi'(x)\psi''(x)+\psi^{(3)}(x)\bigr]}\Psi(x) \triangleq\phi(x),\quad x \gt 0. \end{equation*}

    From Lemma 3.5, it follows

    \begin{align*} \lim\limits_{x\to\infty}\phi(x)& = -\lim\limits_{x\to\infty}\Biggl\{\frac{x} {\bigl[\frac1x+\frac1{2x^2}+O\bigl(\frac1{x^2}\bigr)\bigr]^2 +\bigl[-\frac1{x^2}-\frac1{x^3}+O\bigl(\frac1{x^3}\bigr)\bigr]}\\ &\quad\times\biggl[2\biggl(\frac1x+\frac1{2x^2}+O\biggl(\frac1{x^2}\biggr)\biggr) \biggl(-\frac1{x^2}-\frac1{x^3} +O\biggl(\frac1{x^3}\biggr)\biggr) +\biggl(\frac2{x^3}+\frac3{x^4}+O\biggl(\frac1{x^4}\biggr)\biggr)\biggr]\Biggr\}\\ & = 4. \end{align*}

    As a result, we have

    \begin{equation} \sideset{}{{}_\mathrm{cm}^{{x}}}\deg[\Psi(x)]\le4. \end{equation} (4.5)

    Combining (4.4) with (4.5) yields (4.1). The proof of Theorem 4.1 is complete.

    Recall from [59] that a function f is said to be strongly completely monotonic on (0, \infty) if it has derivatives of all orders and (-1)^nx^{n+1}f^{(n)}(x) is nonnegative and decreasing on (0, \infty) for all n\ge0 .

    Theorem 5.1 ([18]). A function f(x) is strongly completely monotonic on (0, \infty) if and only if the function xf(x) is completely monotonic on (0, \infty) .

    This theorem implies that the set of completely monotonic functions whose completely monotonic degrees are not less than 1 with respect to x\in(0, \infty) coincides with the set of strongly completely monotonic functions on (0, \infty) .

    Because not finding a proof for [18] anywhere, we now provide a proof for Theorem 5.1 as follows.

    Proof of Theorem 5.1. If xf(x) is completely monotonic on (0, \infty) , then

    \begin{equation*} (-1)^k[xf(x)]^{(k)} = (-1)^k\bigl[xf^{(k)}(x)+kf^{(k-1)}(x)\bigr] = \frac{(-1)^kx^{k+1}\;f^{(k)}(x)-k[(-1)^{k-1}\;\;x^kf^{(k-1)}\;\;(x)]}{x^k}\ge0 \end{equation*}

    on (0, \infty) for all integers k\ge0 . From this and by induction, we obtain

    \begin{multline*} (-1)^kx^{k+1}f^{(k)}(x)\ge k[(-1)^{k-1}x^kf^{(k-1)}(x)]\ge k(k-1)[(-1)^{k-2}x^{k-1}f^{(k-2)}(x)]\ge\dotsm\\ \ge [k(k-1)\dotsm4\cdot3]x^3f''(x) \ge [k(k-1)\dotsm4\cdot3\cdot2]x^2f'(x)\ge k!xf(x)\ge0 \end{multline*}

    on (0, \infty) for all integers k\ge0 . So, the function f(x) is strongly completely monotonic on (0, \infty) .

    Conversely, if f(x) is a strongly completely monotonic function on (0, \infty) , then

    \begin{equation*} (-1)^kx^{k+1}f^{(k)}(x)\ge0 \end{equation*}

    and

    \begin{equation*} \bigl[(-1)^kx^{k+1}f^{(k)}(x)\bigr]' = \frac{(k+1)\;\;\bigl[(-1)^kx^{k+1}\;\;f^{(k)}(x)\bigr] -(-1)^{k+1}\;\;x^{k+2}\;\;f^{(k+1)}\;\;(x)}x \le0 \end{equation*}

    hold on (0, \infty) for all integers k\ge0 . Hence, it follows that xf(x)\ge0 and (-1)^{k+1}[xf(x)]^{(k+1)} on (0, \infty) for all integers k\ge0 . As a result, the function xf(x) is completely monotonic on (0, \infty) . The proof of Theorem 5.1 is complete.

    Now we prove a property of logarithmically concave functions.

    Theorem 6.1. If f(x) is differentiable and logarithmically concave \rm( or logarithmically convex, respectively \rm) on (-\infty,\infty) , then the product f(x)f(\lambda-x) for any fixed number \lambda\in\mathbb{R} is increasing \rm( or decreasing, respectively \rm) with respect to x\in\bigl(-\infty,\frac{\lambda}2\bigr) and decreasing \rm( or increasing, respectively \rm) with respect to x\in\bigl(\frac{\lambda}2,\infty\bigr) .

    Proof. Taking the logarithm of f(x)f(\lambda-x) and differentiating give

    \{\ln[f(x)f(\lambda-x)]\}' = \frac{f'(x)}{f(x)}-\frac{f'(\lambda-x)}{f(\lambda-x)}.

    In virtue of the logarithmic concavity of f(x) , it follows that the function \frac{f'(x)}{f(x)} is decreasing and \frac{f'(\lambda-x)}{f(\lambda-x)} is increasing on (-\infty, \infty) . From the obvious fact that \{\ln[f(x)f(\lambda-x)]\}'|_{x = \lambda/2} = 0 , it is deduced that \{\ln[f(x)f(\lambda-x)]\}' < 0 for x > \frac\lambda2 and \{\ln[f(x)f(\lambda-x)]\}' > 0 for x < \frac\lambda2 . Hence, the function f(x)f(\lambda-x) is decreasing for x > \frac\lambda2 and increasing for x < \frac\lambda2 .

    For the case of f(x) being logarithmically convex, it can be proved similarly.

    In this section, we list several remarks on our main results and pose two open prblems.

    Remark 7.1. The function \sigma(s) defined in (4.2) is a special case of the function

    \begin{equation*} g_{a,b}(s) = \begin{cases} \dfrac{s}{b^{s}-a^{s}},&s\ne0,\\[0.5em] \dfrac1{\ln b-\ln a},&s = 0, \end{cases} \end{equation*}

    where a, b are positive numbers and a\ne b . Some special cases of the function g_{a, b}(s) and their reciprocals have been investigated and applied in many papers such as [6,8,60,61,62,63,64,65,66,67,68,69,70,71,72,73,74,75]. This subject was also surveyed in [76]. Recently, it was discovered that the derivatives of the function \frac{\sigma(s)}s = \frac1{1-e^{-s}} have something to do with the Stirling numbers of the first and second kinds in combinatorics and number theory. For detailed and more information, please refer to [77,78,79,80,81,82,83,84,85,86,87,88,89].

    By Theorem 6.1, it can be deduced that the function \sigma''(s)\sigma''(t-s) is increasing with respect to s\in\bigl(0, \frac{t}2\bigr) and decreasing with respect to s\in\bigl(\frac{t}2, t\bigr) , where \sigma is defined in (4.2).

    The techniques used in the proof of Theorem 6.1 was ever utilized in the papers [70,90,91,92] and closely related references therein.

    Remark 7.2. The result obtained in Theorem 4.1 in this paper affirmatively answers those questions asked on page 3393 at the end of Section 2. Therefore, the result in Theorem 4.1 strengthens, improves, and sharpens those results in (2.7). This implies that other results established in [14,16] can also be further improved, developed, or amended.

    Remark 7.3 (First open problem). Motivated by Lemma 3.4, the proof of Theorem 4.1, and Theorem 6.1, we pose the following open problem: when f_i for 1\le i\le n are all logarithmically concave on [0, a) for all a > 0 , can one find a stronger lower bound than the one in (3.3) for the convolution f_1\ast f_2\ast\dotsm\ast f_n(x) ?

    Remark 7.4 (Second open problem). We conjecture that the completely monotonic degrees with respect to x\in(0, \infty) of the functions h_\lambda(x) and -h_\mu(x) defined by (2.5) are 4 if and only if \lambda\le0 and \mu\ge4 . In other words,

    \begin{equation*} \sideset{}{{}_\mathrm{cm}^{{x}}}\deg[h_\lambda(x)] = \sideset{}{{}_\mathrm{cm}^{{x}}}\deg[-h_\mu(x)] = 4 \end{equation*}

    if and only if \lambda\le0 and \mu\ge4 .

    Remark 7.5. This paper is a revised and shortened version of the preprint [93].

    In ths paper, the author proved that the completely monotonic degree of the function [\psi'(x)]^2+\psi''(x) with respect to x\in(0, \infty) is 4 , verified that the set of all strongly completely monotonic functions on (0, \infty) coincides with the set of functions whose completely monotonic degrees are greater than or equal to 1 on (0, \infty) , presented a property of logarithmically concave functions, and posed two open problems on a stronger lower bound of the convolution of finite many functions and on completely monotonic degree of a kind of completely monotonic functions on (0, \infty) .

    The author thanks anonymous referees for their careful corrections to, helpful suggestions to, and valuable comments on the original version of this manuscript.

    The author declares that he have no conflict of interest.



    [1] Z. B. Zheng, S. A. Xie, H. N. Dai, X. P. Chen, H. M. Wang, Blockchain challenges and opportunities: A survey, Int. J. Web. Grid. Serv., 2018,352–375. https://doi.org/10.1504/IJWGS.2018.095647
    [2] Google Scholar. Available from: https://scholar.google.com/.
    [3] CoinMarketCap. Available from: https://coinmarketcap.com/.
    [4] R. B. Grinberg, Bitcoin: An innovative alternative digital currency, J. Amer. Math. Soc., 2012. http://dx.doi.org/10.1090/S0894-0347-1992-1124979-1
    [5] E. Androulaki, G. O. Karame, M. Roeschlin, T. Scherer, S. Capkun, Evaluating user privacy in bitcoin, Financ. Cryptogr. Data Secur., 7859 (2013), 34–51. https://doi.org/10.1007/978-3-642-39884-1_4 doi: 10.1007/978-3-642-39884-1_4
    [6] D. Hopwood, S. Bowe, T. Hornby, N. Wilcox, Zcash protocol specification, GitHub: San Francisco, CA, USA, 4 (2016), 220.
    [7] G. Maxwell, Coinjoin: Bitcoin privacy for the real world. Available from: https://bitcointalk.org/index.php?topic = 279249.
    [8] S. F. Sun, M. H. Au, J. K. Liu, T. H. Yuen, Ringct 2.0: A compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency monero, Comput. Secur., 10493 (2017), 456–474. https://doi.org/10.1007/978-3-319-66399-9_25 doi: 10.1007/978-3-319-66399-9_25
    [9] C. M. Christensen, T. Hall, K. Dillon, D. S. Duncan, Know your customers' jobs to be done, Harvard Bus. Rev., 94 (2016), 54–62.
    [10] J. Ferwerda, The economics of crime and money laundering: Does anti-money laundering policy reduce crime?, Rev. Law. Econ., 5 (2009), 903–929. https://doi.org/10.2202/1555-5879.1421 doi: 10.2202/1555-5879.1421
    [11] R. Auer, R. Böhme, The technology of retail central bank digital currency, J. Amer. Math. Soc., 2020. http://dx.doi.org/10.1090/S0894-0347-1992-1124979-1
    [12] T. P. Pedersen, Non-interactive and information-theoretic secure verifiable secret sharing, CRYPTO 1991: Advances in Cryptology, Springer, Berlin, Heidelberg, 576 (2001), 129–140. https://doi.org/10.1007/3-540-46766-1_9
    [13] Mimblewimble, Tom Elvis Jedusor. Available from: https://download.wpsoftware.net/bitcoin/wizardry/mimblewimble.txt.
    [14] N. Van Saberhagen, CryptoNote v 2.0, J. Amer. Math. Soc., 2013.
    [15] E. Fujisaki, K. Suzuki, Traceable ring signature, PKC 2007: Public Key Cryptography, Springer, Berlin, Heidelberg, 4450 (2007), 181–200. https://doi.org/10.1007/978-3-540-71677-8_13
    [16] T. H. Yuen, S. Sun, J. K. Liu, M. H. Au, M. F. Esgin, Q. Z. Zhang, Ringct 3.0 for blockchain confidential transaction: Shorter size and stronger security, Financial Cryptography and Data Security, Springer, Cham, 12059 (2020), 464–483. https://doi.org/10.1007/978-3-030-51280-4_25
    [17] P. Fauzi, S. Meiklejohn, R. Mercer, C. Orlandi, Quisquis: A new design for anonymous cryptocurrencies, ASIACRYPT 2019: Advances in Cryptology, Springer, Cham, 11921 (2019), 649–678. https://doi.org/10.1007/978-3-030-34578-5_23
    [18] I. Miers, C. Garman, M. Green, A. D. Rubin, Zerocoin: Anonymous distributed e-cash from bitcoin, In: 2013 IEEE Symposium on Security and Privacy, IEEE, Berkeley, CA, USA, 2013,397–411. https://doi.org/10.1109/SP.2013.34
    [19] A. De Santis, S. Micali, G. Persiano, Non-interactive zero-knowledge proof systems, CRYPTO 1987: Advances in Cryptology, Springer, Berlin, Heidelberg, 293 (1988), 52–72. https://doi.org/10.1007/3-540-48184-2_5
    [20] E. B. Sasson, A. Chiesa, C. Garman, M. Green, I. Miers, E. Tromer, et al., Zerocash: Decentralized anonymous payments from bitcoin, In: 2014 IEEE Symposium on Security and Privacy, IEEE, Berkeley, CA, USA, 2014,459–474. http://dx.doi.org/10.1109/SP.2014.36
    [21] N. Bitansky, R. Canetti, A. Chiesa, E. Tromer, From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again, ITCS '12: Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, 2012,326–349. https://doi.org/10.1145/2090236.2090263
    [22] M. Szydlo, Merkle tree traversal in log space and time, EUROCRYPT 2004: Advances in Cryptology, Springer, Berlin, Heidelberg, 3027 (2004), 541–554. https://doi.org/10.1007/978-3-540-24676-3_32
    [23] C. Garman, M. Green, I. Miers, Accountable privacy for decentralized anonymous payments, FC 2016: Financial Cryptography and Data Security, Springer, Berlin, Heidelberg, 2017, 81–98. https://doi.org/10.1007/978-3-662-54970-4_5
    [24] E. Cecchetti, F. Zhang, Y. Ji, A. Kosba, A. Juels, E. Shi, Solidus: Confidential distributed ledger transactions via PVORM, CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017,701–717. https://doi.org/10.1145/3133956.3134010
    [25] Y. Li, G. Yang, W. Susilo, Y. Yu, M. H. Au, D. X. Liu, Traceable monero: Anonymous cryptocurrency with enhanced accountability, In: IEEE Transactions on Dependable and Secure Computing, IEEE, 18 (2019), 679–691. http://dx.doi.org/10.1109/TDSC.2019.2910058
    [26] N. Narula, W. Vasquez, M. Virza, zkLedger: Privacy-Preserving auditing for distributed ledgers, In: Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18), USA, 2018, 65–80.
    [27] P. Chatzigiannis, F. Baldimtsi, Miniledger: Compact-sized anonymous and auditable distributed payments, ESORICS 2021: Computer Security, Springer, Cham, 12972 (2021), 407–429. https://doi.org/10.1007/978-3-030-88418-5_20
    [28] Y. Chen, X. Ma, C. Tang, M. H. Au, PGC: decentralized confidential payment system with auditability, ESORICS 2020: Computer Security, Springer, Cham, 12308 (2020), 591–610. https://doi.org/10.1007/978-3-030-58951-6_29
    [29] B. Bünz, J. Bootle, D. Boneh, A. Poelstra, P. Wuille, G. Maxwell, Bulletproofs: Short proofs for confidential transactions and more, In: 2018 IEEE symposium on security and privacy (SP), IEEE, San Francisco, CA, USA, 2018,315–334. https://doi.org/10.1109/SP.2018.00020
    [30] B. Bünz, S. Agrawal, M. Zamani, D. Boneh, Zether: Towards privacy in a smart contract world, FC 2020: Financial Cryptography and Data Security, Springer, Cham, 12059 (2020), 423–443. https://doi.org/10.1007/978-3-030-51280-4_23
    [31] Z. Guan, Z. Wan, Y. Yang, Y. Zhou, B. Huang, BlockMaze: An efficient privacy-preserving account-model blockchain based on zk-SNARKs, IEEE Transactions on Dependable and Secure Computing, IEEE, 19 (2020), 1446–1463. https://doi.org/10.1109/TDSC.2020.3025129
    [32] E. Androulaki, J. Camenisch, A. D. Caro, M. Dubovitskaya, K. Elkhiyaoui, B. Tackmann, Privacy-preserving auditable token payments in a permissioned blockchain system, AFT '20: Proceedings of the 2nd ACM Conference on Advances in Financial Technologies, 2020,255–267. https://doi.org/10.1145/3419614.3423259
    [33] I. Damgård, C. Ganesh, H. Khoshakhlagh, C. Orlandi, L. Siniscalchi, Balancing privacy and accountability in blockchain identity management, CT-RSA 2021: Topics in Cryptology, Springer, Cham, 12704 (2021), 552–576. https://doi.org/10.1007/978-3-030-75539-3_23
    [34] O. Goldreich, Secure multi-party computation, Manuscript Preliminary Version, 1998, 78–110.
    [35] M. M. Islam, M. K. Islam, M. Shahjalal, M. Z. Chowdhury, Y. M. Jang, A low-cost cross-border payment system based on auditable cryptocurrency with consortium blockchain: Joint digital currency, In: IEEE Transactions on Services Computing, IEEE, 16 (2022), 1616–1629. https://doi.org/10.1109/TSC.2022.3207224
    [36] K. Wüst, K. Kostiainen, N. Delius, S. Capkun, Platypus: A central bank digital currency with unlinkable transactions and privacy-preserving regulation, CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022, 2947–2960. https://doi.org/10.1145/3548606.3560617
    [37] A. Tomescu, A. Bhat, B. Applebaum, I. Abraham, G. Gueta, B. Pinkas, et al., Utt: Decentralized ecash with accountable privacy, Cryptology ePrint Archive, 2022, in press. Available from: https://ia.cr/2022/452.
    [38] L. Xue, D. Liu, J. Ni, X. Lin, X. S. Shen, Enabling regulatory compliance and enforcement in decentralized anonymous payment, IEEE Transactions on Dependable and Secure Computing, IEEE, 20 (2022), 931–943. https://doi.org/10.1109/TDSC.2022.3144991
    [39] C. Lin, X. Huang, J. Ning, D. He, Aca: Anonymous, confidential and auditable transaction systems for blockchain, IEEE Transactions on Dependable and Secure Computing, IEEE, 20 (2022), 4536–4550. https://doi.org/10.1109/TDSC.2022.3228236
    [40] A. Menezes, The discrete logarithm problem, Elliptic Curve Public Key Cryptosystems, Springer, Boston, MA, 234 (1993), 49–59. https://doi.org/10.1007/978-1-4615-3198-2_4
    [41] D. Pointcheval, O. Sanders, Short randomizable signatures, CT-RSA 2016: Topics in Cryptology, Springer, Cham, 9610 (2016), 111–126. https://doi.org/10.1007/978-3-319-29485-8_7
  • This article has been cited by:

    1. Felix Sadyrbaev, On Solutions of the Third-Order Ordinary Differential Equations of Emden-Fowler Type, 2023, 3, 2673-8716, 550, 10.3390/dynamics3030028
    2. Asma Al-Jaser, Clemente Cesarano, Belgees Qaraad, Loredana Florentina Iambor, Second-Order Damped Differential Equations with Superlinear Neutral Term: New Criteria for Oscillation, 2024, 13, 2075-1680, 234, 10.3390/axioms13040234
    3. Asma Al-Jaser, Insaf F. Ben Saoud, Higinio Ramos, Belgees Qaraad, Investigation of the Oscillatory Behavior of the Solutions of a Class of Third-Order Delay Differential Equations with Several Terms, 2024, 13, 2075-1680, 703, 10.3390/axioms13100703
    4. Najiyah Omar, Stefano Serra-Capizzano, Belgees Qaraad, Faizah Alharbi, Osama Moaaz, Elmetwally M. Elabbasy, More Effective Criteria for Testing the Oscillation of Solutions of Third-Order Differential Equations, 2024, 13, 2075-1680, 139, 10.3390/axioms13030139
    5. Mohamed Mazen, Mohamed M. A. El-Sheikh, Samah Euat Tallah, Gamal A. F. Ismail, On the Oscillation of Fourth-Order Delay Differential Equations via Riccati Transformation, 2025, 13, 2227-7390, 494, 10.3390/math13030494
  • Reader Comments
  • © 2024 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(1658) PDF downloads(97) Cited by(0)

Figures and Tables

Figures(3)  /  Tables(5)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog