Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5)
  • Open Access


    A Conditionally Anonymous Linkable Ring Signature for Blockchain Privacy Protection

    Quan Zhou1,*, Yulong Zheng1, Minhui Chen2, Kaijun Wei2

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 2851-2867, 2023, DOI:10.32604/csse.2023.039908

    Abstract In recent years, the issue of preserving the privacy of parties involved in blockchain transactions has garnered significant attention. To ensure privacy protection for both sides of the transaction, many researchers are using ring signature technology instead of the original signature technology. However, in practice, identifying the signer of an illegal blockchain transaction once it has been placed on the chain necessitates a signature technique that offers conditional anonymity. Some illegals can conduct illegal transactions and evade the law using ring signatures, which offer perfect anonymity. This paper firstly constructs a conditionally anonymous linkable ring signature using the Diffie-Hellman key… More >

  • Open Access


    Blockchain-Based Privacy-Preserving Public Auditing for Group Shared Data

    Yining Qi1,2,*, Yubo Luo3, Yongfeng Huang1,2, Xing Li1,2

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 2603-2618, 2023, DOI:10.32604/iasc.2023.030191

    Abstract Cloud storage has been widely used to team work or cooperation development. Data owners set up groups, generating and uploading their data to cloud storage, while other users in the groups download and make use of it, which is called group data sharing. As all kinds of cloud service, data group sharing also suffers from hardware/software failures and human errors. Provable Data Possession (PDP) schemes are proposed to check the integrity of data stored in cloud without downloading. However, there are still some unmet needs lying in auditing group shared data. Researchers propose four issues necessary for a secure group… More >

  • Open Access


    Smart Quarantine Environment Privacy through IoT Gadgets Using Blockchain

    Nitish Pathak1, Shams Tabrez Siddiqui2, Anjani Kumar Singha3, Heba G Mohamed4, Shabana Urooj4,*, Abhinandan R Patil5

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3021-3036, 2023, DOI:10.32604/iasc.2023.029053

    Abstract The coronavirus, formerly known as COVID-19, has caused massive global disasters. As a precaution, most governments imposed quarantine periods ranging from months to years and postponed significant financial obligations. Furthermore, governments around the world have used cutting-edge technologies to track citizens’ activity. Thousands of sensors were connected to IoT (Internet of Things) devices to monitor the catastrophic eruption with billions of connected devices that use these novel tools and apps, privacy and security issues regarding data transmission and memory space abound. In this study, we suggest a blockchain-based methodology for safeguarding data in the billions of devices and sensors connected… More >

  • Open Access


    Blockchain-based Privacy-Preserving Group Data Auditing with Secure User Revocation

    Yining Qi1,2,*, Yubo Luo3, Yongfeng Huang1,2, Xing Li1,2

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 183-199, 2023, DOI:10.32604/csse.2023.031030

    Abstract Progress in cloud computing makes group data sharing in outsourced storage a reality. People join in group and share data with each other, making team work more convenient. This new application scenario also faces data security threats, even more complex. When a user quit its group, remaining data block signatures must be re-signed to ensure security. Some researchers noticed this problem and proposed a few works to relieve computing overhead on user side. However, considering the privacy and security need of group auditing, there still lacks a comprehensive solution to implement secure group user revocation, supporting identity privacy preserving and… More >

  • Open Access


    A Trust Value Sharing Scheme in Heterogeneous Identity Federation Topologies

    Ning Liu1, Fan Yang1, *, Xi Xiong1, 2, Yan Chang1, Shibin Zhang1

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1559-1570, 2020, DOI:10.32604/cmc.2020.010562

    Abstract Recent developments in heterogeneous identity federation systems have heightened the need for the related trust management system. The trust management system evaluates, manages, and shares users’ trust values. The service provider (SP) members of the federation system rely on users’ trust values to determine which type and quality of service will be provided to the users. While identity federation systems have the potential to help federated users save time and energy and improve service experience, the benefits also come with significant privacy risks. So far, there has been little discussion about the privacy protection of users in heterogeneous identity federation… More >

Displaying 1-10 on page 1 of 5. Per Page