Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (302)
  • Open Access

    ARTICLE

    Electricity Carbon Quota Trading Scheme based on Certificateless Signature and Blockchain

    Xiaodong Yang1,4, Runze Diao1,*, Tao Liu2, Haoqi Wen1, Caifen Wang3

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 1695-1712, 2024, DOI:10.32604/cmes.2023.029461

    Abstract The carbon trading market can promote “carbon peaking” and “carbon neutrality” at low cost, but carbon emission quotas face attacks such as data forgery, tampering, counterfeiting, and replay in the electricity trading market. Certificateless signatures are a new cryptographic technology that can address traditional cryptography’s general essential certificate requirements and avoid the problem of crucial escrow based on identity cryptography. However, most certificateless signatures still suffer from various security flaws. We present a secure and efficient certificateless signing scheme by examining the security of existing certificateless signature schemes. To ensure the integrity and verifiability of electricity carbon quota trading, we… More >

  • Open Access

    ARTICLE

    A Conditionally Anonymous Linkable Ring Signature for Blockchain Privacy Protection

    Quan Zhou1,*, Yulong Zheng1, Minhui Chen2, Kaijun Wei2

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 2851-2867, 2023, DOI:10.32604/csse.2023.039908

    Abstract In recent years, the issue of preserving the privacy of parties involved in blockchain transactions has garnered significant attention. To ensure privacy protection for both sides of the transaction, many researchers are using ring signature technology instead of the original signature technology. However, in practice, identifying the signer of an illegal blockchain transaction once it has been placed on the chain necessitates a signature technique that offers conditional anonymity. Some illegals can conduct illegal transactions and evade the law using ring signatures, which offer perfect anonymity. This paper firstly constructs a conditionally anonymous linkable ring signature using the Diffie-Hellman key… More >

  • Open Access

    ARTICLE

    MBE: A Music Copyright Depository Framework Incorporating Blockchain and Edge Computing

    Jianmao Xiao1, Ridong Huang1, Jiangyu Wang1, Zhean Zhong1, Chenyu Liu1, Yuanlong Cao1,*, Chuying Ouyang2

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 2815-2834, 2023, DOI:10.32604/csse.2023.039716

    Abstract Audio copyright is a crucial issue in the music industry, as it protects the rights and interests of creators and distributors. This paper studies the current situation of digital music copyright certification and proposes a music copyright certification framework based on “blockchain + edge computing mode,” abbreviated as MBE, by integrating edge computing into the Hyperledger Fabric system. MBE framework compresses and splits the audio into small chunks, performs Fast Fourier Transform (FFT) to extract the peak points of each frequency and combines them to obtain unique audio fingerprint information. After being confirmed by various nodes on the Fabric alliance… More >

  • Open Access

    ARTICLE

    Medi-Block Record Secure Data Sharing in Healthcare System: Issues, Solutions and Challenges

    Zuriati Ahmad Zukarnain1,*, Amgad Muneer2,3, Nur Atirah Mohamad Nassir1, Akram A. Almohammedi4,5

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 2725-2740, 2023, DOI:10.32604/csse.2023.034448

    Abstract With the advancements in the era of artificial intelligence, blockchain, cloud computing, and big data, there is a need for secure, decentralized medical record storage and retrieval systems. While cloud storage solves storage issues, it is challenging to realize secure sharing of records over the network. Medi-block record in the healthcare system has brought a new digitalization method for patients’ medical records. This centralized technology provides a symmetrical process between the hospital and doctors when patients urgently need to go to a different or nearby hospital. It enables electronic medical records to be available with the correct authentication and restricts… More >

  • Open Access

    ARTICLE

    Linguistic Knowledge Representation in DPoS Consensus Scheme for Blockchain

    Yixia Chen1,2, Mingwei Lin1,2,*

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 845-866, 2023, DOI:10.32604/cmc.2023.040970

    Abstract The consensus scheme is an essential component in the real blockchain environment. The Delegated Proof of Stake (DPoS) is a competitive consensus scheme that can decrease energy costs, promote decentralization, and increase efficiency, respectively. However, how to study the knowledge representation of the collective voting information and then select delegates is a new open problem. To ensure the fairness and effectiveness of transactions in the blockchain, in this paper, we propose a novel fine-grained knowledge representation method, which improves the DPoS scheme based on the linguistic term set (LTS) and proportional hesitant fuzzy linguistic term set (PHFLTS). To this end,… More >

  • Open Access

    ARTICLE

    Research on Metaverse Security and Forensics

    Guangjun Liang1,2,3, Jianfang Xin4,*, Qun Wang1,2, Xueli Ni1,2,3, Xiangmin Guo1,2,3, Pu Chen1

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 799-825, 2023, DOI:10.32604/cmc.2023.038403

    Abstract As a subversive concept, the metaverse has recently attracted widespread attention around the world and has set off a wave of enthusiasm in academic, industrial, and investment circles. However, while the metaverse brings unprecedented opportunities for transformation to human society, it also contains related risks. Metaverse is a digital living space with information infrastructure, interoperability system, content production system, and value settlement system as the underlying structure in which the inner core is to connect real residents through applications and identities. Through social incentives and governance rules, the metaverse reflects the digital migration of human society. This article will conduct… More >

  • Open Access

    ARTICLE

    Efficient Multi-Authority Attribute-Based Searchable Encryption Scheme with Blockchain Assistance for Cloud-Edge Coordination

    Peng Liu1, Qian He1,*, Baokang Zhao2, Biao Guo1, Zhongyi Zhai1

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3325-3343, 2023, DOI:10.32604/cmc.2023.041167

    Abstract Cloud storage and edge computing are utilized to address the storage and computational challenges arising from the exponential data growth in IoT. However, data privacy is potentially risky when data is outsourced to cloud servers or edge services. While data encryption ensures data confidentiality, it can impede data sharing and retrieval. Attribute-based searchable encryption (ABSE) is proposed as an effective technique for enhancing data security and privacy. Nevertheless, ABSE has its limitations, such as single attribute authorization failure, privacy leakage during the search process, and high decryption overhead. This paper presents a novel approach called the blockchain-assisted efficient multi-authority attribute-based… More >

  • Open Access

    ARTICLE

    Decentralized Heterogeneous Federal Distillation Learning Based on Blockchain

    Hong Zhu*, Lisha Gao, Yitian Sha, Nan Xiang, Yue Wu, Shuo Han

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3363-3377, 2023, DOI:10.32604/cmc.2023.040731

    Abstract Load forecasting is a crucial aspect of intelligent Virtual Power Plant (VPP) management and a means of balancing the relationship between distributed power grids and traditional power grids. However, due to the continuous emergence of power consumption peaks, the power supply quality of the power grid cannot be guaranteed. Therefore, an intelligent calculation method is required to effectively predict the load, enabling better power grid dispatching and ensuring the stable operation of the power grid. This paper proposes a decentralized heterogeneous federated distillation learning algorithm (DHFDL) to promote trusted federated learning (FL) between different federates in the blockchain. The algorithm… More >

  • Open Access

    ARTICLE

    CF-BFT: A Dual-Mode Byzantine Fault-Tolerant Protocol Based on Node Authentication

    Zhiruo Zhang, Feng Wang*, Yang Liu, Yang Lu, Xinlei Liu

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3113-3129, 2023, DOI:10.32604/cmc.2023.040600

    Abstract The consensus protocol is one of the core technologies in blockchain, which plays a crucial role in ensuring the block generation rate, consistency, and safety of the blockchain system. Blockchain systems mainly adopt the Byzantine Fault Tolerance (BFT) protocol, which often suffers from slow consensus speed and high communication consumption to prevent Byzantine nodes from disrupting the consensus. In this paper, this paper proposes a new dual-mode consensus protocol based on node identity authentication. It divides the consensus process into two subprotocols: Check_BFT and Fast_BFT. In Check_BFT, the replicas authenticate the primary’s identity by monitoring its behaviors. First, assume that… More >

  • Open Access

    REVIEW

    Blockchain Security Threats and Collaborative Defense: A Literature Review

    Xiulai Li1,2,3,4, Jieren Cheng1,3,*, Zhaoxin Shi2,3, Jingxin Liu2,3, Bin Zhang1,3, Xinbing Xu2,3, Xiangyan Tang1,3, Victor S. Sheng5

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 2597-2629, 2023, DOI:10.32604/cmc.2023.040596

    Abstract As a distributed database, the system security of the blockchain is of great significance to prevent tampering, protect privacy, prevent double spending, and improve credibility. Due to the decentralized and trustless nature of blockchain, the security defense of the blockchain system has become one of the most important measures. This paper comprehensively reviews the research progress of blockchain security threats and collaborative defense, and we first introduce the overview, classification, and threat assessment process of blockchain security threats. Then, we investigate the research status of single-node defense technology and multi-node collaborative defense technology and summarize the blockchain security evaluation indicators… More >

Displaying 51-60 on page 6 of 302. Per Page