Systematic review: Comparing zk‐SNARK, zk‐STARK, and bulletproof protocols for privacy‐preserving authentication
This systematic literature review examines the implementation and analysis of zk‐SNARK,
zk‐STARK, and bulletproof non‐interactive zero‐knowledge proof (NIZKP) protocols in …
zk‐STARK, and bulletproof non‐interactive zero‐knowledge proof (NIZKP) protocols in …
Location proof systems for smart internet of things: Requirements, taxonomy, and comparative analysis
In the current hyper-connected, data-driven era, smart devices are providing access to
geolocation information, enabling a paradigm shift in diverse domains. Location proof …
geolocation information, enabling a paradigm shift in diverse domains. Location proof …
Meeting points in ridesharing: A privacy-preserving approach
Nowadays, problems of congestion in urban areas due to the massive usage of cars, last-
minute travel needs and progress in information and communication technologies have …
minute travel needs and progress in information and communication technologies have …
Blockchain for secure location verification
In location-sensitive applications, dishonest users may submit fake location claims to
illegally access a service or obtain benefit. To address this issue, a number of location proof …
illegally access a service or obtain benefit. To address this issue, a number of location proof …
Pasport: A secure and private location proof generation and verification framework
Recently, there has been a rapid growth in location-based systems and applications in
which users submit their location information to service providers in order to gain access to a …
which users submit their location information to service providers in order to gain access to a …
Securerun: Cheat-proof and private summaries for location-based activities
Activity-tracking applications, where people record and upload information about their
location-based activities (eg, the routes of their activities), are increasingly popular. Such …
location-based activities (eg, the routes of their activities), are increasingly popular. Such …
A robust spatio-temporal verification protocol for blockchain
Massive Spatio-temporal data is increasingly collected in a variety of domains including
supply chain. The authenticity as well as the security of such data is usually a concern due to …
supply chain. The authenticity as well as the security of such data is usually a concern due to …
[图书][B] Personalized privacy protection in big data
Over the past few decades, massive volumes of data in digital form have been generated,
collected, and published with the fast booming of high-performance computing devices and …
collected, and published with the fast booming of high-performance computing devices and …
Proof of location through a blockchain agnostic smart contract language
M Bonini, M Zichichi, S Ferrettiv… - 2023 IEEE 43rd …, 2023 - ieeexplore.ieee.org
Location-based services are at the heart of many applications that individuals use every day.
However, there is often no guarantee of the truthfulness of users' location data, since this …
However, there is often no guarantee of the truthfulness of users' location data, since this …
SPARSE: privacy-aware and collusion resistant location proof generation and verification
Recently, there has been an increase in the number of location-based services and
applications. It is common for these applications to provide facilities or rewards for users who …
applications. It is common for these applications to provide facilities or rewards for users who …