IPFS and friends: A qualitative comparison of next generation peer-to-peer data networks

E Daniel, F Tschorsch - IEEE Communications Surveys & …, 2022 - ieeexplore.ieee.org
Decentralized, distributed storage offers a way to reduce the impact of data silos as often
fostered by centralized cloud storage. While the intentions of this trend are not new, the topic …

Sok: Communication across distributed ledgers

A Zamyatin, M Al-Bassam, D Zindros… - … Cryptography and Data …, 2021 - Springer
Since the inception of Bitcoin, a plethora of distributed ledgers differing in design and
purpose has been created. While by design, blockchains provide no means to securely …

Candid: Can-do decentralized identity with legacy compatibility, sybil-resistance, and accountability

D Maram, H Malvai, F Zhang… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
We present CanDID, a platform for practical, user-friendly realization of decentralized
identity, the idea of empowering end users with management of their own credentials. While …

Asynchronous Distributed Key Generation for Computationally-Secure Randomness, Consensus, and Threshold Signatures.

E Kokoris Kogias, D Malkhi, A Spiegelman - Proceedings of the 2020 …, 2020 - dl.acm.org
In this paper, we present the first Asynchronous Distributed Key Generation (ADKG)
algorithm which is also the first distributed key generation algorithm that can generate …

Towards secure and decentralized sharing of IoT data

HTT Truong, M Almeida, G Karame… - 2019 IEEE …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) bears unprecedented security and scalability challenges due to
the magnitude of data produced and exchanged by IoT devices and platforms. Some of …

A taxonomic approach to understanding emerging blockchain identity management systems

L Lesavre, P Varin, P Mell, M Davidson… - arXiv preprint arXiv …, 2019 - arxiv.org
Identity management systems (IDMSs) are widely used to provision user identities while
managing authentication, authorization, and data sharing within organizations and on the …

CHURP: dynamic-committee proactive secret sharing

SKD Maram, F Zhang, L Wang, A Low… - Proceedings of the …, 2019 - dl.acm.org
We introduce CHURP (CHUrn-Robust Proactive secret sharing). CHURP enables secure
secret-sharing in dynamic settings, where the committee of nodes storing a secret changes …

Cobra: Dynamic proactive secret sharing for confidential bft services

R Vassantlal, E Alchieri, B Ferreira… - 2022 IEEE symposium …, 2022 - ieeexplore.ieee.org
Byzantine Fault-Tolerant (BFT) State Machine Replication (SMR) is a classical paradigm for
implementing trustworthy services that has received renewed interest with the emergence of …

Personal data trading scheme for data brokers in IoT data marketplaces

H Oh, S Park, GM Lee, H Heo, JK Choi - Ieee Access, 2019 - ieeexplore.ieee.org
With the widespread use of the Internet of Things, data-driven services take the lead of both
online and off-line businesses. Especially, personal data draw heavy attention of service …

Blockchain-based secure data transmission for internet of underwater things

A Razzaq - Cluster Computing, 2022 - Springer
Abstract Internet of Things (IoTs) is an integrated network collection of heterogeneous
objects which enable seamless integration between systems, humans, devices, and various …