Blockchain-based secure data storage protocol for sensors in the industrial internet of things

J Lu, J Shen, P Vijayakumar… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The Industrial Internet of Things (IIoT) that introduces Internet of Things (IoT) technology into
industrial environments is beneficial to construct smart factories. It utilizes various sensors to …

A Scalable Blockchain Framework for Secure Transactions in IoT-Based Dynamic Applications

S Basudan - IEEE Open Journal of the Communications Society, 2023 - ieeexplore.ieee.org
The essential characteristics of blockchain, such as immutability and auditability, are leading
to its increasing incorporation into society. The Internet of Things (IoT) aims to create a …

Application-oriented block generation for consortium blockchain-based IoT systems with dynamic device management

A Zhang, P Zhang, H Wang, X Lin - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Due to its salient features, such as immutability and auditability, blockchain is becoming
more integrated into the Internet of Things (IoT) for enhancing security and developing a …

A dynamic quantum group blind signature scheme based on four-particle cluster state

RB Lu, JX Zhong, YQ Shi, BL Liao, L Luo… - Quantum Information …, 2023 - Springer
Group blind signature (GBS) is the combination of group signature and blind signature (BS)
concepts. GBS allows any member of the group to generate a valid signature on behalf of …

Post-quantum secure group signature with verifier local revocation and backward unlinkability

S Gao, X Chen, H Li, W Susilo, Q Huang - Computer Standards & Interfaces, 2024 - Elsevier
Group signature supports users to generate signatures on behalf of the group. Verifier local
revocation (VLR) is an important method to revoke a misbehaving user in group signature …

A privilege-constrained sanitizable signature scheme for e-health systems

Y Zhan, B Yi, Y Yang, R Shi, C Dong… - Journal of Systems …, 2023 - Elsevier
Electronic health record (EHR) sharing schemes are widely used in healthcare, medical,
and research. However, privacy may be a concern for patients with EHRs. In this paper, a …

Using Range-Revocable Pseudonyms to Provide Backward Unlinkability in the Edge

C Correia, M Correia, L Rodrigues - Proceedings of the 2023 ACM …, 2023 - dl.acm.org
In this paper we propose a novel abstraction that we have named Range-Revocable
Pseudonyms (RRPs). RRPs are a new class of pseudonyms whose validity can be revoked …

LARP: A lightweight auto-refreshing pseudonym protocol for V2X

Z Yang, TT Anh Dinh, C Yin, Y Yao, D Yang… - Proceedings of the 27th …, 2022 - dl.acm.org
Vehicle-to-everything (V2X) communication is the key enabler for emerging intelligent
transportation systems. Applications built on top of V2X require both authentication and …

Lattice-based group signatures with time-bound keys via redactable signatures

Y Tang, Y Li, Q Ye, D He - IEEE Transactions on Information …, 2023 - ieeexplore.ieee.org
Group signatures are active cryptographic topics where group members are granted right to
sign messages anonymously on behalf of their group. However, in practical applications …

Group time-based one-time passwords and its application to efficient privacy-preserving proof of location

Z Yang, C Jin, J Ning, Z Li, A Dinh, J Zhou - Proceedings of the 37th …, 2021 - dl.acm.org
Time-based One-Time Password (TOTP) provides a strong second factor for user
authentication. In TOTP, a prover authenticates to a verifier by using the current time and a …