Privacy-preserving reputation systems based on blockchain and other cryptographic building blocks: A survey
O Hasan, L Brunie, E Bertino - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
The purpose of a reputation system is to hold the users of a distributed application
accountable for their behavior. The reputation of a user is computed as an aggregate of the …
accountable for their behavior. The reputation of a user is computed as an aggregate of the …
M2M security: Challenges and solutions
Machine-to-machine (M2M) is one of the emergent technologies that has attracted a lot of
attention in both industrial and academic sectors, and which is expected to grow in the next …
attention in both industrial and academic sectors, and which is expected to grow in the next …
Ringct 2.0: A compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency monero
In this work, we initially study the necessary properties and security requirements of Ring
Confidential Transaction (RingCT) protocol deployed in the popular anonymous …
Confidential Transaction (RingCT) protocol deployed in the popular anonymous …
Efficient and privacy-preserving carpooling using blockchain-assisted vehicular fog computing
Carpooling enables passengers to share a vehicle to reduce traveling time, vehicle carbon
emissions, and traffic congestion. However, the majority of passengers lean to find local …
emissions, and traffic congestion. However, the majority of passengers lean to find local …
Blockchain-enabled secure energy trading with verifiable fairness in industrial Internet of Things
Energy trading in Industrial Internet of Things (IIoT), a fundamental approach to realize
Industry 4.0, plays a vital role in satisfying energy demands and optimizing system efficiency …
Industry 4.0, plays a vital role in satisfying energy demands and optimizing system efficiency …
Short randomizable signatures
D Pointcheval, O Sanders - Topics in Cryptology-CT-RSA 2016: The …, 2016 - Springer
Digital signature is a fundamental primitive with numerous applications. Following the
development of pairing-based cryptography, several taking advantage of this setting have …
development of pairing-based cryptography, several taking advantage of this setting have …
Enabling strong privacy preservation and accurate task allocation for mobile crowdsensing
Mobile crowdsensing engages a crowd of individuals to use their mobile devices to
cooperatively collect data about social events and phenomena for customers with common …
cooperatively collect data about social events and phenomena for customers with common …
5G vehicle-to-everything services: Gearing up for security and privacy
5G is emerging to serve as a platform to support networking connections for sensors and
vehicles on roads and provide vehicle-to-everything (V2X) services to drivers and …
vehicles on roads and provide vehicle-to-everything (V2X) services to drivers and …
A privacy-preserving scheme for incentive-based demand response in the smart grid
The advanced metering infrastructure (AMI) in the smart grid provides real-time information
to both grid operators and customers, exploiting the full potential of demand response (DR) …
to both grid operators and customers, exploiting the full potential of demand response (DR) …
An accumulator based on bilinear maps and efficient revocation for anonymous credentials
The success of electronic authentication systems, be it e-ID card systems or Internet
authentication systems such as CardSpace, highly depends on the provided level of user …
authentication systems such as CardSpace, highly depends on the provided level of user …