[PDF][PDF] A comprehensive survey of threshold digital signatures: Nist standards, post-quantum cryptography, exotic techniques, and real-world applications

K Sedghighadikolaei, AA Yavuz - arXiv preprint arXiv:2311.05514, 2023 - researchgate.net
Threshold digital signatures enable a distributed execution of signature functionalities and
will play a crucial role in the security of emerging decentralized next-generation networked …

Blockchain-cloud transparent data marketing: Consortium management and fairness

D Liu, C Huang, J Ni, X Lin… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Data are generated by Internet of Things (IoT) devices and centralized at a cloud server, that
can later be traded with third parties, ie, data marketing, to enable various data-intensive …

Aggregate signatures with versatile randomization and issuer-hiding multi-authority anonymous credentials

O Mir, B Bauer, S Griffy, A Lysyanskaya… - Proceedings of the 2023 …, 2023 - dl.acm.org
Anonymous credentials (AC) offer privacy in user-centric identity management. They enable
users to authenticate anonymously, revealing only necessary attributes. With the rise of …

Blockchain-assisted transparent cross-domain authorization and authentication for smart city

C Huang, L Xue, D Liu, X Shen… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Secure cross-domain authorization and authentication (AA) enable application service
providers (ASPs) to allow users for resource access from different trusted domains. In this …

Issuer-hiding attribute-based credentials

J Bobolz, F Eidens, S Krenn, S Ramacher… - Cryptology and Network …, 2021 - Springer
Attribute-based credential systems enable users to authenticate in a privacy-preserving
manner. However, in such schemes verifying a user's credential requires knowledge of the …

Threshold signatures with private accountability

D Boneh, C Komlo - Annual International Cryptology Conference, 2022 - Springer
Existing threshold signature schemes come in two flavors:(i) fully private, where the
signature reveals nothing about the set of signers that generated the signature, and (ii) …

Privacy-preserving asynchronous federated learning framework in distributed iot

X Yan, Y Miao, X Li, KKR Choo… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
To solve the data island issue in the distributed Internet of Things (IoT) without privacy
leakage, privacy-preserving federated learning (PPFL) has been extensively explored in …

Secure multi-party computation-based privacy-preserving authentication for smart cities

V Sucasas, A Aly, G Mantas… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The increasing concern for identity confidentiality in the Smart City scenario has fostered
research on privacy-preserving authentication based on pseudonymization. Pseudonym …

Blockchain-based credential management for anonymous authentication in SAGVN

D Liu, H Wu, C Huang, J Ni… - IEEE Journal on Selected …, 2022 - ieeexplore.ieee.org
In this paper, we propose a blockchain-based collaborative credential management scheme
for anonymous authentication in space-air-ground integrated vehicular networks (SAGVN) …

Threshold structure-preserving signatures

E Crites, M Kohlweiss, B Preneel, M Sedaghat… - … Conference on the …, 2023 - Springer
Abstract Structure-preserving signatures (SPS) are an important building block for privacy-
preserving cryptographic primitives, such as electronic cash, anonymous credentials, and …