Filters








423 Hits in 8.3 sec

A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity

Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng, Kouichi Sakurai
2022 Cryptography  
This survey reviews the two most prominent group-oriented anonymous signature schemes and analyzes the existing approaches for their problem: balancing anonymity against traceability.  ...  Group signatures and ring signatures are the two leading competitive signature schemes with a rich body of research. Both group and ring signatures enable user anonymity with group settings.  ...  Introduction This paper is a survey of two prominent group-oriented digital signatures called group signatures and ring signatures, which support user authentication and anonymity.  ... 
doi:10.3390/cryptography6010003 fatcat:dby2hr4g4zhqtemdm3tm43552u

OBSERVATIONAL SIGNATURES OF PLANETS IN PROTOPLANETARY DISKS. I. GAPS OPENED BY SINGLE AND MULTIPLE YOUNG PLANETS IN DISKS

Ruobing Dong (董若冰), Zhaohuan Zhu (朱照寰), Barbara Whitney (韦韦)
2015 Astrophysical Journal  
signatures of gaps opened by one or several planets, making qualitative comparisons with observations.  ...  When viewed at a moderate inclination angle, a physically circular on-centered gap could appear to be off-centered from the star due to shadowing.  ...  RX J1604.3-2130 (Zhang et al. 2014 ) and SAO 206462 (Garufi et al. 2013) both show a bigger cavity size at mm than at NIR (∼ 78 vs ∼ 63 AU in RX J1604.3-2130, and ∼ 46 vs ∼ 28 in SAO 206462), while  ... 
doi:10.1088/0004-637x/809/1/93 fatcat:mgsusutlyvh4jbmh7y2zahsory

A Survey on Privacy Vulnerabilities in Permissionless Blockchains

Aisha Zahid Junejo, Manzoor Ahmed, Abdullah Abdulrehman
2020 International Journal of Advanced Computer Science and Applications  
As a result, data anonymity and confidentiality are compromised making several business enterprises and industrialists hesitant to adopt the technology.  ...  However, it fails to provide complete anonymity due to following reasons:  Fixed denomination coins are used.  Before payment is made, anonymous coins need to be converted into non-anonymous ones.  ...  ACKNOWLEDGMENTS The authors would like to extend their gratitude to Universiti Teknologi PETRONAS for provision of necessary equipment and resources to carry out the research.  ... 
doi:10.14569/ijacsa.2020.0110915 fatcat:oczcaq4hh5fdfh4jjk4grgibau

Privacy-Preserving Schemes for Ad Hoc Social Networks: A Survey

Mohamed Amine Ferrag, Leandros Maglaras, Ahmed Ahmim
2017 IEEE Communications Surveys and Tutorials  
Based on this existing privacy preservation schemes, we survey privacy preservation models, including location privacy, identity privacy, anonymity, traceability, interest privacy, backward privacy, and  ...  With this survey, readers can have a more thorough understanding of research trends in privacy-preserving schemes for ad hoc social networks.  ...  As discussed in the anonymity sub section, we have both the conditional traceability on signature and the full traceability on signature [61] , [51] .  ... 
doi:10.1109/comst.2017.2718178 fatcat:pmlbjv3dnvfclfoqg2pnxlc7mi

An empirical study to demonstrate that EdDSA can be used as a performance improvement alternative to ECDSA in Blockchain and IoT

Guruprakash J, Srinivas Koppu
2022 Informatica (Ljubljana, Tiskana izd.)  
Digital signatures are a vital part of the digital world. The trust factor in the digital world is ensured with a digital signature.  ...  A digital signature scheme (DSS) is used to generate signatures. This paper investigates the widely used elliptic curve digital signature algorithm (ECDSA) and its application to blockchain and IoT.  ...  elliptic curve digital signature and ring signature scheme.  ... 
doi:10.31449/inf.v46i2.3807 fatcat:dbn2dwzxkrbavg2c6d5oql7mqe

Empirical Evaluation of Privacy Efficiency in Blockchain Networks: Review and Open Challenges

Aisha Zahid Junejo, Manzoor Ahmed Hashmani, Mehak Maqbool Memon
2021 Applied Sciences  
The calculation of privacy precision will be based on the effectiveness and strength of various privacy protecting attributes of a solution and the associated risks.  ...  With the widespread of blockchain technology, preserving the anonymity and confidentiality of transactions have become crucial.  ...  We infer that this study will enable successful development, deployment, testing, and empirical evaluation of privacy preserving techniques in blockchain networks, being a key driving force for future  ... 
doi:10.3390/app11157013 fatcat:3pvl77nsrbg63ntf6g3hoejwpu

Security in P2P Networks: Survey and Research Directions [chapter]

Esther Palomar, Juan M. Estevez-Tapiador, Julio C. Hernandez-Castro, Arturo Ribagorda
2006 Lecture Notes in Computer Science  
In this paper, we present a survey on security issues in P2P networks, providing a comparative analysis of existing solutions and identifying directions for future research.  ...  sharing, and collaborative working environments.  ...  Identification vs.  ... 
doi:10.1007/11807964_19 fatcat:qqbpckz7hnagxcg5se6rdylxjm

PRIVACY IN ADVANCED CRYPTOGRAPHIC PROTOCOLS: PROTOTYPICAL EXAMPLES

Phan Duong Hieu, Moti Yung
2021 Journal of Computer Science and Cybernetics  
%classical authentication with group, ring signatures, anonymous credentials. - Private computation.  ...  This is a typical example of a concrete study on a contemporary scenario where one should deal with the unexpected social problem but needs not pay the cost of weakening the privacy of users.  ...  They used a bilinear map on a composite-order group and the secret key is the factorization of the order of the group.  ... 
doi:10.15625/1813-9663/37/4/16104 fatcat:o7mu4ht5uneadncuyouedgs7nq

A Survey on Blockchain Technology: Evolution, Architecture and Security

Muhammad Nasir Mumtaz Bhutta, Amir A. Khwaja, Adnan Nadeem, Hafiz Farooq Ahmad, Muhammad Khurram Khan, Moataz Hanif, Houbing Song, Majed Alshamari, Yue Cao
2021 IEEE Access  
Unlike other Blockchain surveys focusing on either its applications, challenges, characteristics, or security, we present a comprehensive survey of Blockchain technology's evolution, architecture, development  ...  Blockchain is a revolutionary technology that is making a great impact on modern society due to its transparency, decentralization, and security properties.  ...  Moreover, the ring signature is a type of digital signature in which a group of potential signatories is combined together to produce a distinct signature that can use to authorize a transaction [146]  ... 
doi:10.1109/access.2021.3072849 fatcat:veqgq5cyx5hgdhkw5zgi5yqyki

Blockchain for Electronic Voting System—Review and Open Research Challenges

Uzma Jafar, Mohd Juzaiddin Ab Aziz, Zarina Shukur
2021 Sensors  
On the other hand, the most often mentioned issues in blockchain applications are privacy protection and transaction speed.  ...  The following article gives an overview of electronic voting systems based on blockchain technology.  ...  Gao, Zheng [8] Anti-Quantum Public PBFT Bitcoin Certificateless Traceable Ring Signature, Code-Based, ECC Double SHA-256 Self-tally McCorry, Shahandashti [76] OVN Public 2 Round-zero  ... 
doi:10.3390/s21175874 pmid:34502764 fatcat:mxxzinrgszdu5gnnkbrimi6bw4

A Model to Evaluate Reliability of Authentication Protocols in C-ITS Safety-Critical Applications

Mir Ali Rezazadeh Baee, Leonie Simpson, Xavier Boyen, Ernest Foo, Josef Pieprzyk
2021 IEEE Transactions on Vehicular Technology  
There is no model to evaluate the efficiency of the proposals in a practical context, where the delay introduced by V2V authentication may impact on driver safety.  ...  Our model can effectively analyze the delay introduced by an authentication protocol, and determine whether this would result in a crash, in the real world vehicular environments.  ...  group, and utilize a group-oriented signature scheme (e.g., group signature [47] or ring signature [48] ) to provide anonymous authentication, while eliminating the issuance of certificates.  ... 
doi:10.1109/tvt.2021.3097088 fatcat:s7l7fey2n5h3zgnkz24nqd5jwu

Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies

Florian Tschorsch, Bjorn Scheuermann
2016 IEEE Communications Surveys and Tutorials  
In this survey, we unroll and structure the manyfold results and research directions. We start by introducing the Bitcoin protocol and its building blocks.  ...  Besides attracting a billion dollar economy, Bitcoin revolutionized the field of digital currencies and influenced many adjacent areas. This also induced significant scientific interest.  ...  The authors would like to thank Daniel Cagara for the discussions on this topic and for sharing his practical experience.  ... 
doi:10.1109/comst.2016.2535718 fatcat:xmdaafdgsvc6tam2kzmaeyorta

A Survey on Challenges and Progresses in Blockchain Technologies: A Performance and Security Perspective

Xiaoying Zheng, Yongxin Zhu, Xueming Si
2019 Applied Sciences  
We also make experiments on Ethereum and survey other popular blockchain platforms on the scalability feature of blockchain.  ...  Blockchain naturally fits multiple industry sectors due its characteristics of decentralization, enhanced security, tamper-proof, improved traceability and transparency.  ...  Thus, anti-quantum algorithms should be explored to improve the cryptograph algorithm security, including blind signature, ring signature, and aggregate signature.  ... 
doi:10.3390/app9224731 fatcat:ccijixyhpje3xjjxgwowsamew4

Wireless Sensor Network Security

An Liu, Mihui Kim, Leonardo B. Oliveira, Hailun Tan
2013 International Journal of Distributed Sensor Networks  
Acknowledgements We wish to thank Alexander Becher and Maximillian Dornseif for many helpful discussions and the delightful previous cooperation in breaking sensors [6] which formed the basis of Section  ...  The user thereof uses the information at its sole risk and liability. References  ...  Background on Physical Attacks on Sensor Nodes Tampering vs.  ... 
doi:10.1155/2013/362385 fatcat:2ph46uukonbtbdkc5q6t4mvgcq

The Security Reference Architecture for Blockchains: Towards a Standardized Model for Studying Vulnerabilities, Threats, and Defenses

Ivan Homoliak, Sarad Venugopalan, Daniel Reijsbergen, Qingze Hum, Richard Schumi, Pawel Szalachowski
2020 IEEE Communications Surveys and Tutorials  
Finally, we provide designers of blockchain platforms and applications with a design methodology following the model of SRA and its hierarchy.  ...  the security reference architecture (SRA) for blockchains, which adopts a stacked model (similar to the ISO/OSI) describing the nature and hierarchy of various security and privacy aspects.  ...  ACKNOWLEDGMENT The authors would like to thank our colleagues Pieter Hartel, Stefanos Leonardos, and Mark van Staalduinen for their valuable feedback.  ... 
doi:10.1109/comst.2020.3033665 fatcat:hcrsvvkb2ffmbdlspshy66wg2y
« Previous Showing results 1 — 15 out of 423 results