A new transitively closed undirected graph authentication scheme for blockchain-based identity management systems

C Lin, D He, X Huang, MK Khan, KKR Choo - IEEE Access, 2018 - ieeexplore.ieee.org
Blockchain can potentially be deployed in a wide range of applications due to its capability
to ensure decentralization, transparency, and immutability. In this paper, we design a …

Toward cross-domain dynamic accumulator authentication based on blockchain in Internet of Things

L Wang, Y Tian, D Zhang - IEEE Transactions on Industrial …, 2021 - ieeexplore.ieee.org
The authentication problem is one of the most significant challenges in the applications of
Internet of Things (IoT), and the relationship authentication among smart devices is an …

Privacy-preserving authentication for general directed graphs in industrial IoT

F Zhu, W Wu, Y Zhang, X Chen - Information sciences, 2019 - Elsevier
Previous solutions on security and privacy in Industrial Internet of Things (IIoT) focus
primarily on the data or the deployment and communication problems of devices. However …

Enabling Privacy-Preserving and Efficient Authenticated Graph Queries on Blockchain-Assisted Clouds

H Wu, Z Li, R Song, B Xiao - IEEE Transactions on Knowledge …, 2023 - ieeexplore.ieee.org
Prior research has introduced a new scenario of blockchain-assisted clouds where the data
owner outsources original data to cloud servers and stores some metadata on the …

Universal designated verifier transitive signatures for graph-based big data

S Hou, X Huang, JK Liu, J Li, L Xu - Information Sciences, 2015 - Elsevier
In this paper, we propose a new type of digital signatures which is specifically designed for
graph-based big data system. The properties of the proposed signatures are twofold. On one …

Zero-knowledge authenticated order queries and order statistics on a list

E Ghosh, O Ohrimenko, R Tamassia - International Conference on Applied …, 2015 - Springer
An order query takes as input a set of elements from a list (ordered sequence) L, and asks
for this set to be ordered using the total order induced by L. We introduce two formal models …

[HTML][HTML] A Traceable Universal Designated Verifier Transitive Signature Scheme

S Hou, C Lin, S Yang - Information, 2024 - mdpi.com
A transitive signature scheme enables anyone to obtain the signature on edge (i, k) by
combining the signatures on edges (i, j) and (j, k), but it suffers from signature theft and …

Fully-dynamic verifiable zero-knowledge order queries for network data

E Ghosh, MT Goodrich, O Ohrimenko… - Cryptology ePrint …, 2015 - eprint.iacr.org
We show how to provide privacy-preserving (zero-knowledge) answers to order queries on
network data that is organized in lists, trees, and partially-ordered sets of bounded …

A universal designated multi-verifier transitive signature scheme

F Zhu, Y Zhang, C Lin, W Wu, R Meng - International Conference on …, 2017 - Springer
Abstract A Universal Designated Verifier Transitive Signature (UDVTS UDVTS) scheme is
designed for the graph-based big data system. Specifically, it allows a transitive signature …

[HTML][HTML] A new universal designated verifier transitive signature scheme for big graph data

C Lin, W Wu, X Huang, L Xu - Journal of Computer and System Sciences, 2017 - Elsevier
We propose a new design of universal designated verifier transitive signatures, to
authenticate dynamically growing big graph data. The scheme is built on the classical RSA …