Systematic review: Comparing zk‐SNARK, zk‐STARK, and bulletproof protocols for privacy‐preserving authentication

B Oude Roelink, M El‐Hajj, D Sarmah - Security and Privacy, 2024 - Wiley Online Library
This systematic literature review examines the implementation and analysis of zk‐SNARK,
zk‐STARK, and bulletproof non‐interactive zero‐knowledge proof (NIZKP) protocols in …

Location proof systems for smart internet of things: Requirements, taxonomy, and comparative analysis

F Zafar, A Khan, A Anjum, C Maple, MA Shah - Electronics, 2020 - mdpi.com
In the current hyper-connected, data-driven era, smart devices are providing access to
geolocation information, enabling a paradigm shift in diverse domains. Location proof …

Meeting points in ridesharing: A privacy-preserving approach

UM Aïvodji, S Gambs, MJ Huguet… - … Research Part C …, 2016 - Elsevier
Nowadays, problems of congestion in urban areas due to the massive usage of cars, last-
minute travel needs and progress in information and communication technologies have …

Blockchain for secure location verification

MR Nosouhi, S Yu, W Zhou, M Grobler… - Journal of Parallel and …, 2020 - Elsevier
In location-sensitive applications, dishonest users may submit fake location claims to
illegally access a service or obtain benefit. To address this issue, a number of location proof …

Pasport: A secure and private location proof generation and verification framework

MR Nosouhi, K Sood, S Yu, M Grobler… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Recently, there has been a rapid growth in location-based systems and applications in
which users submit their location information to service providers in order to gain access to a …

Securerun: Cheat-proof and private summaries for location-based activities

A Pham, K Huguenin, I Bilogrevic… - IEEE Transactions …, 2015 - ieeexplore.ieee.org
Activity-tracking applications, where people record and upload information about their
location-based activities (eg, the routes of their activities), are increasingly popular. Such …

A robust spatio-temporal verification protocol for blockchain

B Nasrulin, M Muzammal, Q Qu - … , United Arab Emirates, November 12-15 …, 2018 - Springer
Massive Spatio-temporal data is increasingly collected in a variety of domains including
supply chain. The authenticity as well as the security of such data is usually a concern due to …

[图书][B] Personalized privacy protection in big data

Y Qu, MR Nosouhi, L Cui, S Yu - 2021 - Springer
Over the past few decades, massive volumes of data in digital form have been generated,
collected, and published with the fast booming of high-performance computing devices and …

Proof of location through a blockchain agnostic smart contract language

M Bonini, M Zichichi, S Ferrettiv… - 2023 IEEE 43rd …, 2023 - ieeexplore.ieee.org
Location-based services are at the heart of many applications that individuals use every day.
However, there is often no guarantee of the truthfulness of users' location data, since this …

SPARSE: privacy-aware and collusion resistant location proof generation and verification

MR Nosouhi, S Yu, M Grobler… - 2018 IEEE Global …, 2018 - ieeexplore.ieee.org
Recently, there has been an increase in the number of location-based services and
applications. It is common for these applications to provide facilities or rewards for users who …