Blockchain-based secure data storage protocol for sensors in the industrial internet of things
J Lu, J Shen, P Vijayakumar… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The Industrial Internet of Things (IIoT) that introduces Internet of Things (IoT) technology into
industrial environments is beneficial to construct smart factories. It utilizes various sensors to …
industrial environments is beneficial to construct smart factories. It utilizes various sensors to …
A Scalable Blockchain Framework for Secure Transactions in IoT-Based Dynamic Applications
S Basudan - IEEE Open Journal of the Communications Society, 2023 - ieeexplore.ieee.org
The essential characteristics of blockchain, such as immutability and auditability, are leading
to its increasing incorporation into society. The Internet of Things (IoT) aims to create a …
to its increasing incorporation into society. The Internet of Things (IoT) aims to create a …
Application-oriented block generation for consortium blockchain-based IoT systems with dynamic device management
Due to its salient features, such as immutability and auditability, blockchain is becoming
more integrated into the Internet of Things (IoT) for enhancing security and developing a …
more integrated into the Internet of Things (IoT) for enhancing security and developing a …
A dynamic quantum group blind signature scheme based on four-particle cluster state
RB Lu, JX Zhong, YQ Shi, BL Liao, L Luo… - Quantum Information …, 2023 - Springer
Group blind signature (GBS) is the combination of group signature and blind signature (BS)
concepts. GBS allows any member of the group to generate a valid signature on behalf of …
concepts. GBS allows any member of the group to generate a valid signature on behalf of …
Post-quantum secure group signature with verifier local revocation and backward unlinkability
Group signature supports users to generate signatures on behalf of the group. Verifier local
revocation (VLR) is an important method to revoke a misbehaving user in group signature …
revocation (VLR) is an important method to revoke a misbehaving user in group signature …
A privilege-constrained sanitizable signature scheme for e-health systems
Electronic health record (EHR) sharing schemes are widely used in healthcare, medical,
and research. However, privacy may be a concern for patients with EHRs. In this paper, a …
and research. However, privacy may be a concern for patients with EHRs. In this paper, a …
Using Range-Revocable Pseudonyms to Provide Backward Unlinkability in the Edge
In this paper we propose a novel abstraction that we have named Range-Revocable
Pseudonyms (RRPs). RRPs are a new class of pseudonyms whose validity can be revoked …
Pseudonyms (RRPs). RRPs are a new class of pseudonyms whose validity can be revoked …
LARP: A lightweight auto-refreshing pseudonym protocol for V2X
Vehicle-to-everything (V2X) communication is the key enabler for emerging intelligent
transportation systems. Applications built on top of V2X require both authentication and …
transportation systems. Applications built on top of V2X require both authentication and …
Lattice-based group signatures with time-bound keys via redactable signatures
Y Tang, Y Li, Q Ye, D He - IEEE Transactions on Information …, 2023 - ieeexplore.ieee.org
Group signatures are active cryptographic topics where group members are granted right to
sign messages anonymously on behalf of their group. However, in practical applications …
sign messages anonymously on behalf of their group. However, in practical applications …
Group time-based one-time passwords and its application to efficient privacy-preserving proof of location
Time-based One-Time Password (TOTP) provides a strong second factor for user
authentication. In TOTP, a prover authenticates to a verifier by using the current time and a …
authentication. In TOTP, a prover authenticates to a verifier by using the current time and a …