A survey on privacy protection in blockchain system

Q Feng, D He, S Zeadally, MK Khan… - Journal of network and …, 2019 - Elsevier
Blockchain, as a decentralized and distributed public ledger technology in peer-to-peer
network, has received considerable attention recently. It applies a linked block structure to …

Anonymity on blockchain based e-cash protocols—A survey

N Andola, VK Yadav, S Venkatesan, S Verma - Computer Science Review, 2021 - Elsevier
The transactions in blockchain framework, based cryptocurrencies are publicly available,
thereby accessible to all users by design. However, the anonymity of blockchain …

Ringct 2.0: A compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency monero

SF Sun, MH Au, JK Liu, TH Yuen - … , Oslo, Norway, September 11-15, 2017 …, 2017 - Springer
In this work, we initially study the necessary properties and security requirements of Ring
Confidential Transaction (RingCT) protocol deployed in the popular anonymous …

Security and privacy challenges in 5G-enabled vehicular networks

C Lai, R Lu, D Zheng, X Shen - IEEE Network, 2020 - ieeexplore.ieee.org
Recently, many academic institutions and standardization organizations have conducted
research on vehicular communications based on LTE or 5G. As the most important …

[PDF][PDF] CryptoNote v 2.0

N Van Saberhagen - 2013 - getmonero.org
“Bitcoin”[1] has been a successful implementation of the concept of p2p electronic cash.
Both professionals and the general public have come to appreciate the convenient …

Post-quantum one-time linkable ring signature and application to ring confidential transactions in blockchain (lattice RingCT v1. 0)

WA Alberto Torres, R Steinfeld, A Sakzad… - Information Security and …, 2018 - Springer
In this paper, we construct a Lattice-based one-time Linkable Ring Signature (L2RS)
scheme, which enables the public to verify if two or more signatures were generated by …

Scalable and redactable blockchain with update and anonymity

K Huang, X Zhang, Y Mu, F Rezaeibagha, X Du - Information Sciences, 2021 - Elsevier
Abstract Internet-of-Things (IoT) envisions communications between heterogeneous devices
and utilization of the associated data for smart decision making. Blockchain bridges the gap …

Threshold signatures with private accountability

D Boneh, C Komlo - Annual International Cryptology Conference, 2022 - Springer
Existing threshold signature schemes come in two flavors:(i) fully private, where the
signature reveals nothing about the set of signers that generated the signature, and (ii) …

Linkable ring signature with unconditional anonymity

JK Liu, MH Au, W Susilo, J Zhou - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
In this paper, we construct a linkable ring signature scheme with unconditional anonymity. It
has been regarded as an open problem in [22] since 2004 for the construction of an …

Privacy preservation in resource-constrained IoT devices using blockchain—A survey

Z Iftikhar, Y Javed, SYA Zaidi, MA Shah, Z Iqbal Khan… - Electronics, 2021 - mdpi.com
With opportunities brought by Internet of Things (IoT), it is quite a challenge to assure privacy
preservation when a huge number of resource-constrained distributed devices is involved …