4.7 Article

Blockchain-based continuous data integrity checking protocol with zero-knowledge privacy protection

Related references

Note: Only part of the references are listed.
Article Computer Science, Hardware & Architecture

Traceable Monero: Anonymous Cryptocurrency with Enhanced Accountability

Yannan Li et al.

Summary: Monero offers high anonymity for users and transactions, but lacks user accountability, which is crucial to combat criminal activities in cryptocurrency transactions. This paper introduces Traceable Monero, a new cryptocurrency that aims to strike a balance between user anonymity and accountability. By overlaying Monero with tracing mechanisms, Traceable Monero ensures security without significantly impacting transaction efficiency.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)

Article Engineering, Multidisciplinary

A Blockchain-Based Traceable Self-Tallying E-Voting Protocol in AI Era

Huilin Li et al.

Summary: Artificial intelligence (AI) has shown great potential in various real-world applications, but faces challenges in trust-oriented applications such as e-voting. This paper aims to strengthen AI ecosystems by developing a blockchain-based traceable self-tallying e-voting system, which supports additional functions like multi-choice and self-tallying, and satisfies anonymity, time-bounded privacy, linkability, and full-traceability. The proposed e-voting protocol is practical and can be adopted in real-world applications, as evaluated by the time and gas costs of operations.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2021)

Article Automation & Control Systems

Blockchain-Based Anonymous Authentication With Selective Revocation for Smart Industrial Applications

Yong Yu et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Engineering, Electrical & Electronic

IntegrityChain: Provable Data Possession for Decentralized Storage

Yannan Li et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2020)

Article Computer Science, Theory & Methods

Efficient Verifiable Delay Functions

Benjamin Wesolowski

JOURNAL OF CRYPTOLOGY (2020)

Article Computer Science, Theory & Methods

Dynamic Proofs of Retrievability Via Oblivious RAM

David Cash et al.

JOURNAL OF CRYPTOLOGY (2017)

Article Computer Science, Information Systems

Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage

Yong Yu et al.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2015)

Article Computer Science, Theory & Methods

Compact Proofs of Retrievability

Hovav Shacham et al.

JOURNAL OF CRYPTOLOGY (2013)

Article Computer Science, Theory & Methods

Security arguments for digital signatures and blind signatures

D Pointcheval et al.

JOURNAL OF CRYPTOLOGY (2000)