Privacy-preserving reputation systems based on blockchain and other cryptographic building blocks: A survey

O Hasan, L Brunie, E Bertino - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
The purpose of a reputation system is to hold the users of a distributed application
accountable for their behavior. The reputation of a user is computed as an aggregate of the …

M2M security: Challenges and solutions

A Barki, A Bouabdallah, S Gharout… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
Machine-to-machine (M2M) is one of the emergent technologies that has attracted a lot of
attention in both industrial and academic sectors, and which is expected to grow in the next …

Ringct 2.0: A compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency monero

SF Sun, MH Au, JK Liu, TH Yuen - … , Oslo, Norway, September 11-15, 2017 …, 2017 - Springer
In this work, we initially study the necessary properties and security requirements of Ring
Confidential Transaction (RingCT) protocol deployed in the popular anonymous …

Efficient and privacy-preserving carpooling using blockchain-assisted vehicular fog computing

M Li, L Zhu, X Lin - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
Carpooling enables passengers to share a vehicle to reduce traveling time, vehicle carbon
emissions, and traffic congestion. However, the majority of passengers lean to find local …

Blockchain-enabled secure energy trading with verifiable fairness in industrial Internet of Things

M Li, D Hu, C Lal, M Conti… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Energy trading in Industrial Internet of Things (IIoT), a fundamental approach to realize
Industry 4.0, plays a vital role in satisfying energy demands and optimizing system efficiency …

Short randomizable signatures

D Pointcheval, O Sanders - Topics in Cryptology-CT-RSA 2016: The …, 2016 - Springer
Digital signature is a fundamental primitive with numerous applications. Following the
development of pairing-based cryptography, several taking advantage of this setting have …

Enabling strong privacy preservation and accurate task allocation for mobile crowdsensing

J Ni, K Zhang, Q Xia, X Lin… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Mobile crowdsensing engages a crowd of individuals to use their mobile devices to
cooperatively collect data about social events and phenomena for customers with common …

5G vehicle-to-everything services: Gearing up for security and privacy

R Lu, L Zhang, J Ni, Y Fang - Proceedings of the IEEE, 2019 - ieeexplore.ieee.org
5G is emerging to serve as a platform to support networking connections for sensors and
vehicles on roads and provide vehicle-to-everything (V2X) services to drivers and …

A privacy-preserving scheme for incentive-based demand response in the smart grid

Y Gong, Y Cai, Y Guo, Y Fang - IEEE Transactions on Smart …, 2015 - ieeexplore.ieee.org
The advanced metering infrastructure (AMI) in the smart grid provides real-time information
to both grid operators and customers, exploiting the full potential of demand response (DR) …

An accumulator based on bilinear maps and efficient revocation for anonymous credentials

J Camenisch, M Kohlweiss, C Soriente - … on Practice and Theory in Public …, 2009 - Springer
The success of electronic authentication systems, be it e-ID card systems or Internet
authentication systems such as CardSpace, highly depends on the provided level of user …