Securing fog computing for internet of things applications: Challenges and solutions

J Ni, K Zhang, X Lin, X Shen - IEEE Communications Surveys & …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) allows billions of physical objects to be connected to collect and
exchange data for offering various applications, such as environmental monitoring …

Bitcoin and beyond: A technical survey on decentralized digital currencies

F Tschorsch, B Scheuermann - IEEE Communications Surveys …, 2016 - ieeexplore.ieee.org
Besides attracting a billion dollar economy, Bitcoin revolutionized the field of digital
currencies and influenced many adjacent areas. This also induced significant scientific …

Compact multi-signatures for smaller blockchains

D Boneh, M Drijvers, G Neven - … Conference on the Theory and Application …, 2018 - Springer
We construct new multi-signature schemes that provide new functionality. Our schemes are
designed to reduce the size of the Bitcoin blockchain, but are useful in many other settings …

VFL: A verifiable federated learning with privacy-preserving for big data in industrial IoT

A Fu, X Zhang, N **ong, Y Gao… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Due to the strong analytical ability of big data, deep learning has been widely applied to
model on the collected data in industrial Internet of Things (IoT). However, for privacy issues …

Simple schnorr multi-signatures with applications to bitcoin

G Maxwell, A Poelstra, Y Seurin, P Wuille - Designs, Codes and …, 2019 - Springer
We describe a new Schnorr-based multi-signature scheme (ie, a protocol which allows a
group of signers to produce a short, joint signature on a common message) called MuSig …

Sok: Secure aggregation based on cryptographic schemes for federated learning

M Mansouri, M Önen, WB Jaballah… - Proceedings on Privacy …, 2023 - petsymposium.org
Secure aggregation consists of computing the sum of data collected from multiple sources
without disclosing these individual inputs. Secure aggregation has been found useful for …

EAAP: Efficient anonymous authentication with conditional privacy-preserving scheme for vehicular ad hoc networks

M Azees, P Vijayakumar… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Providing an efficient anonymous authentication scheme in vehicular ad hoc networks
(VANETs) with low computational cost is a challenging issue. Even though, there are some …

Digital signature scheme for information non-repudiation in blockchain: a state of the art review

W Fang, W Chen, W Zhang, J Pei, W Gao… - EURASIP Journal on …, 2020 - Springer
Blockchain, as one of the most promising technology, has attracted tremendous attention.
The interesting characteristics of blockchain are decentralized ledger and strong security …

A survey on anonymity and privacy in bitcoin-like digital cash systems

MCK Khalilov, A Levi - IEEE Communications Surveys & …, 2018 - ieeexplore.ieee.org
Bitcoin is the most widely known distributed, peer-to-peer payment network without
existence of a central authority. In Bitcoin, users do not use real names; instead …

[HTML][HTML] Cryptographic primitives in blockchains

L Wang, X Shen, J Li, J Shao, Y Yang - Journal of Network and Computer …, 2019 - Elsevier
Blockchain, as one of the crypto-intensive creatures, has become a very hot topic recently.
Although many surveys have recently been dedicated to the security and privacy issues of …