Privacy-preserving traffic management: A blockchain and zero-knowledge proof inspired approach

W Li, H Guo, M Nejad, CC Shen - IEEE access, 2020 - ieeexplore.ieee.org
Incorporation of connected vehicle (CV) data into real-time traffic management systems
presents a host of new challenges resulting from the current lack of data integrity and data …

On the economic impact of crypto-ransomware attacks: The state of the art on enterprise systems

A Zimba, M Chishimba - European Journal for Security Research, 2019 - Springer
Abstract According to Cybersecurity Ventures research in 2017, in every 40 s, a business
falls prey to a ransomware attack and the rate is predicted to rise to 14 s by 2019. Business …

Blockchain-based anonymous reporting scheme with anonymous rewarding

H Wang, D He, Z Liu, R Guo - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Since the ancient times, there exist all kinds of criminals in the world. In order to punish
them, most authorities usually encourage the people to provide the evidence of a crime. To …

Non-interactive, secure verifiable aggregation for decentralized, privacy-preserving learning

C Brunetta, G Tsaloli, B Liang, G Banegas… - … on Information Security …, 2021 - Springer
We propose a novel primitive called NIVA NIVA that allows the distributed aggregation of
multiple users' secret inputs by multiple untrusted servers. The returned aggregation result …

Cuproof: Range proof with constant size

C Deng, L You, X Tang, G Hu, S Gao - Entropy, 2022 - mdpi.com
Zero-Knowledge Proof is widely used in blockchains. For example, zk-SNARK is used in
Zcash as its core technology to identifying transactions without the exposure of the actual …

A survey on range proof and its applications on blockchain

C Deng, J Fan, Z Wang, Y Luo, Y Zheng… - … on Cyber-Enabled …, 2019 - ieeexplore.ieee.org
Blockchain is one of the hot research technologies recently. Blockchain-based distributed
ledger requires that all the transactions are public and transparent such that the transactions …

Properties of Decentralized Consensus Technology--Why not every Blockchain is a Blockchain

C Ehmke, F Blum, V Gruhn - arXiv preprint arXiv:1907.09289, 2019 - arxiv.org
Research in the field of blockchain technology and applications is increasing at a fast pace.
Although the Bitcoin whitepaper by Nakamoto is already ten years old, the field can still be …

基于后量子假设的高效范围证明方案

滕瑜莹, 谢翔, 邓燚 - Journal of Cyber Security, 2020 - jcs.iie.ac.cn
作为零知识证明的一种特殊应用, 范围证明技术广泛地应用于密码货币, 电子投票,
匿名凭证等多个场景. 这项技术使得证明者能够向验证者证明某一秘密整数属于一个给定的连续 …

Systematic modelling of anonymity with application to cryptocurrencies

N Amarasinghe - 2022 - eprints.qut.edu.au
This thesis presents a generalised comprehensive framework for evaluating anonymity of
cryptocurrency schemes. The framework was developed using security modelling with …

SPCTR: Sealed Auction‐Based Procurement for Closest Pre‐Tender with Range Validation

L Li, J Liu, P Jia - Security and Communication Networks, 2020 - Wiley Online Library
Over the past decades, there have existed extensive research works on the designs of the
closest pre‐tender procurement bidding. However, most solutions for the closest pre‐tender …