Shaping the future of Ethereum: Exploring energy consumption in Proof-of-Work and Proof-of-Stake consensus

R Asif, SR Hassan - Frontiers in Blockchain, 2023 - frontiersin.org
Ethereum (ETH) is a popular Layer-1 blockchain platform that has been used to create
decentralized applications (dApps) and smart contracts. Ethereum 2.0, or Serenity, is a …

Intel software guard extensions applications: A survey

NC Will, CA Maziero - ACM Computing Surveys, 2023 - dl.acm.org
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …

SoK: TEE-assisted confidential smart contract

R Li, Q Wang, Q Wang, D Galindo, M Ryan - arXiv preprint arXiv …, 2022 - arxiv.org
The blockchain-based smart contract lacks privacy since the contract state and instruction
code are exposed to the public. Combining smart-contract execution with Trusted Execution …

Bidirectional utilization of blockchain and privacy computing: Issues, progress, and challenges

H Zhang, W Fan, J Wang - Journal of Network and Computer Applications, 2023 - Elsevier
With the rapid development of information technology and the increasing popularity of
personalized services, the flow of users' personal information in the Internet is inevitable …

[HTML][HTML] SoK: Privacy-preserving smart contract

H Qi, M Xu, D Yu, X Cheng - High-Confidence Computing, 2024 - Elsevier
The privacy concern in smart contract applications continues to grow, leading to the
proposal of various schemes aimed at developing comprehensive and universally …

A privacy-preserving mobile crowdsensing scheme based on blockchain and trusted execution environment

T Peng, K Guan, J Liu - IEICE TRANSACTIONS on Information and …, 2022 - search.ieice.org
A mobile crowdsensing system (MCS) utilizes a crowd of users to collect large-scale data
using their mobile devices efficiently. The collected data are usually linked with sensitive …

An automatic-identification-system-based vessel security system

MY Chen, HT Wu - IEEE Transactions on Industrial Informatics, 2022 - ieeexplore.ieee.org
As today's transportation systems have gradually developed into intelligent transportation
systems, the fundamental elements of the system consist of vessels, harbors, and ship-shore …

Decentralized translator of trust: Supporting heterogeneous tee for critical infrastructure protection

R Karanjai, R Collier, Z Gao, L Chen, X Fan… - Proceedings of the 5th …, 2023 - dl.acm.org
Trusted execution environment (TEE) technology has found many applications in mitigating
various security risks in an efficient manner, which is attractive for critical infrastructure …

Distributed auditing protocol for untraceable transactions

SB Far, MR Asaar, A Haghbin - Journal of Information Security and …, 2023 - Elsevier
Data integrity is a property that cloud service providers (CSPs) have focused on. The data
integrity checking is assigned to third-party auditors (TPAs) to avoid invalid data storage in …

ETS-TEE: An energy-efficient task scheduling strategy in a mobile trusted computing environment

H Wang, L Cai, X Hao, J Ren… - Tsinghua Science and …, 2022 - ieeexplore.ieee.org
A trusted execution environment (TEE) is a system-on-chip and CPU system with a wide
security solution available on today's Arm application (APP) processors, which dominate the …