Blockchain-oriented privacy protection of sensitive data in the internet of vehicles

C Xu, H Wu, H Liu, W Gu, Y Li… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The Internet of Vehicles is the specific instantiation of the Internet of Things in the field of
transportation. Vehicle and driving data are often used to mine information about people's …

A survey of the fusion of traditional data security technology and blockchain

Y Xu, G Xu, Y Liu, Y Liu, M Shen - Expert Systems with Applications, 2024 - Elsevier
Blockchain is a new distributed infrastructure and computing paradigm, which has been
widely used in various fields. For example, utilizing a chain data structure to verify and …

A novel quantum ring signature scheme without using entangled states

Z Xiong, A Yin - Quantum Information Processing, 2022 - Springer
Ring signature is widely used in e-commerce and voting systems because of its excellent
anonymity. Some schemes have quantum ring signatures that require the use of hard-to …

A framework for efficient lattice-based DAA

L Chen, N El Kassem, A Lehmann… - Proceedings of the 1st …, 2019 - dl.acm.org
Currently standardized Direct Anonymous Attestation (DAA) schemes have their security
based on the factoring and the discrete logarithm problems, and are therefore insecure …

Repudiable ring signature: Stronger security and logarithmic-size

H Lin, M Wang - Computer Standards & Interfaces, 2022 - Elsevier
Ring signature, introduced by Rivest et al.[Asiacrypt'01], allows a person to sign a document
on behalf of an ad-hoc group (or ring) while hiding the identity of the actual signer. But the …

A certificateless ring signature scheme based on lattice

SS Dong, YH Zhou, YG Yang… - … and Computation: Practice …, 2022 - Wiley Online Library
For the problems that ring signature needs key escrow, has some security risks, and cannot
avoid malicious key generation center (KGC) in the post‐quantum era, we design a …

Use of Blockchain Technology in Data Integrity Assurance

ST Whyte, BO Omoyiola, B Okoni - Available at SSRN 4043164, 2022 - papers.ssrn.com
Consumers always have high expectations of the safety and accuracy of their data.
Blockchain technology provides this much-needed data integrity assurance with its high …

A Novel Linkable Ring Signature on Ideal Lattices

C Cao, L You, G Hu - Entropy, 2023 - mdpi.com
In this paper, a novel linkable ring signature scheme is constructed. The hash value of the
public key in the ring and the signer's private key are based on random numbers. This …

A lattice-based ring signature scheme with gradual revelation of non-signers

R Kumar, S Padhye - International Journal of Information Technology, 2024 - Springer
A ring signature scheme (RSS) is a way to leak secrets anonymously. If the verifier (eg
journalist) does not trust some of the ring members then the ring signature with gradual …

Deniable ring signature scheme based on the ISRSAC digital signature algorithm

Y Zhang, Y Yuan, N Liu, Y Chen, Y Dong - PeerJ Computer Science, 2024 - peerj.com
This article introduces a deniable ring signature scheme within the framework of a ring
signature protocol, which allows a member of the ring to assert or deny their role as the …