[PDF][PDF] A comprehensive survey of threshold digital signatures: Nist standards, post-quantum cryptography, exotic techniques, and real-world applications
K Sedghighadikolaei, AA Yavuz - arXiv preprint arXiv:2311.05514, 2023 - researchgate.net
Threshold digital signatures enable a distributed execution of signature functionalities and
will play a crucial role in the security of emerging decentralized next-generation networked …
will play a crucial role in the security of emerging decentralized next-generation networked …
Blockchain-cloud transparent data marketing: Consortium management and fairness
Data are generated by Internet of Things (IoT) devices and centralized at a cloud server, that
can later be traded with third parties, ie, data marketing, to enable various data-intensive …
can later be traded with third parties, ie, data marketing, to enable various data-intensive …
Aggregate signatures with versatile randomization and issuer-hiding multi-authority anonymous credentials
O Mir, B Bauer, S Griffy, A Lysyanskaya… - Proceedings of the 2023 …, 2023 - dl.acm.org
Anonymous credentials (AC) offer privacy in user-centric identity management. They enable
users to authenticate anonymously, revealing only necessary attributes. With the rise of …
users to authenticate anonymously, revealing only necessary attributes. With the rise of …
Blockchain-assisted transparent cross-domain authorization and authentication for smart city
Secure cross-domain authorization and authentication (AA) enable application service
providers (ASPs) to allow users for resource access from different trusted domains. In this …
providers (ASPs) to allow users for resource access from different trusted domains. In this …
Issuer-hiding attribute-based credentials
Attribute-based credential systems enable users to authenticate in a privacy-preserving
manner. However, in such schemes verifying a user's credential requires knowledge of the …
manner. However, in such schemes verifying a user's credential requires knowledge of the …
Threshold signatures with private accountability
Existing threshold signature schemes come in two flavors:(i) fully private, where the
signature reveals nothing about the set of signers that generated the signature, and (ii) …
signature reveals nothing about the set of signers that generated the signature, and (ii) …
Privacy-preserving asynchronous federated learning framework in distributed iot
X Yan, Y Miao, X Li, KKR Choo… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
To solve the data island issue in the distributed Internet of Things (IoT) without privacy
leakage, privacy-preserving federated learning (PPFL) has been extensively explored in …
leakage, privacy-preserving federated learning (PPFL) has been extensively explored in …
Secure multi-party computation-based privacy-preserving authentication for smart cities
The increasing concern for identity confidentiality in the Smart City scenario has fostered
research on privacy-preserving authentication based on pseudonymization. Pseudonym …
research on privacy-preserving authentication based on pseudonymization. Pseudonym …
Blockchain-based credential management for anonymous authentication in SAGVN
In this paper, we propose a blockchain-based collaborative credential management scheme
for anonymous authentication in space-air-ground integrated vehicular networks (SAGVN) …
for anonymous authentication in space-air-ground integrated vehicular networks (SAGVN) …
Threshold structure-preserving signatures
Abstract Structure-preserving signatures (SPS) are an important building block for privacy-
preserving cryptographic primitives, such as electronic cash, anonymous credentials, and …
preserving cryptographic primitives, such as electronic cash, anonymous credentials, and …