Two-Factor Privacy Preserving Protocol for Efficient Authentication in Internet of Vehicles Networks

MA Al Sibahee, VO Nyangaresi… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
Internet of Vehicles (IoV) has greatly improved safety and quality of services in intelligent
transportation system (ITS). However, the deployed dedicated short-range communication …

Privacy preserving for electronic medical record sharing in healthchain with group signature

C Li, B Jiang, M Dong, X Xin, K Ota - IEEE Systems Journal, 2023 - ieeexplore.ieee.org
Healthchain is a new solution for electronic medical record (EMR) management in the
Internet of Medical Things, which avoids data island and information tampering problems by …

Efficient attribute-based signature with collusion resistance for internet of vehicles

B Chen, T Xiang, X Li, M Zhang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Internet of Vehicles (IoV) realizes information interaction between vehicles and all
networked entities, and the heterogeneous, openness, and diversity make it suffer from …

A Privacy-enhanced Traceable Anonymous Transaction Scheme for Blockchain

L Xue, H Huang, F Xiao, Q Li… - IEEE Transactions on …, 2025 - ieeexplore.ieee.org
Blockchain transaction privacy is a highly researched topic across various application
scenarios. Current privacy-preserving schemes in blockchain employ advanced …

A privacy-preserving data transfer in a blockchain-based commercial real estate platform using random address generation mechanism

MM AbdulKader, SG Kumar - The Journal of Supercomputing, 2023 - Springer
To conceal the actual output address, the stealth address protocol generates a one-time
temporary output address for the blockchain. The user identity privacy is improved here by …

TRCT: A Traceable Anonymous Transaction Protocol for Blockchain

J Duan, L Wang, W Wang, L Gu - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Anonymous cryptocurrencies are distributed applications based on blockchain technology
that enhance the anonymity of user transactions. However, they also provide cover for many …

Research on Privacy Protection of Technology Service Transactions Based on Blockchain and Zero‐Knowledge Proof

J Zhu, W Feng, W Zhong, M Huang… - … and Mobile Computing, 2023 - Wiley Online Library
In view of the problem that the transaction privacy in the current blockchain technology
service is easy to be leaked, a bulletproof alliance chain technology service transaction …

[Retracted] Anonymous Traceability Protocol Based on Group Signature for Blockchain

Q An, Y Zhang, C Guo, X Liu, J Huang… - Security and …, 2022 - Wiley Online Library
In blockchain technology, data are stored on decentralized nodes and public to each node
in the blockchain network. Hence, the focus of privacy protection in the blockchain …

A Multi-Party Functional Signatures Scheme for Private Blockchain

Q Zhou, Y Zheng, K Wei, M Chen, Z Zeng - Cryptography, 2023 - mdpi.com
Digital signature technology is essential for ensuring the authenticity and unforgeability of
transactions in a private blockchain framework. In some scenarios, transactions require …

TrackFed: An Efficient Connection Tracking Protocol for Federated Identity Management in Heterogeneous Fog Computing

O el Farouk Imine, Y Imine… - 2024 IEEE Wireless …, 2024 - ieeexplore.ieee.org
Federated identity management (FIM) is a promising approach that allows secure access to
multiple security domains in heterogenous architecture such as fog computing. Keeping …