Blockchain-based identity management systems: A review
Identity management solutions are generally designed to facilitate the management of digital
identities and operations such as authentication, and have been widely used in real-world …
identities and operations such as authentication, and have been widely used in real-world …
Internet of things 2.0: Concepts, applications, and future directions
Applications and technologies of the Internet of Things are in high demand with the increase
of network devices. With the development of technologies such as 5G, machine learning …
of network devices. With the development of technologies such as 5G, machine learning …
Group signatures with time-bound keys revisited: a new model, an efficient construction, and its implementation
Chu et al.(ASIACCS 2012) proposed group signature with time-bound keys (GS-TBK),
where each signing key is associated with expiry time τ. In addition, to prove membership of …
where each signing key is associated with expiry time τ. In addition, to prove membership of …
Fair traceable multi-group signatures
This paper presents fair traceable multi-group signatures (FTMGS), which have enhanced
capabilities, compared to group and traceable signatures, that are important in real world …
capabilities, compared to group and traceable signatures, that are important in real world …
Revocable group signature with constant-size revocation list
It is essential that a multi-user cryptographic primitive be revocable since a legitimate user
may quit the organization, or may act on malicious intent, or the relevant key may be leaked …
may quit the organization, or may act on malicious intent, or the relevant key may be leaked …
Sybil-free pseudonyms, privacy and trust: Identity management in the internet of services
We propose an identity management system that supports role-based pseudonyms that are
bound to a given set of services (service contexts) and support the use of reputation …
bound to a given set of services (service contexts) and support the use of reputation …
Identity and anonymity in ad hoc networks
LA Martucci - 2009 - diva-portal.org
In ad hoc networks every device is responsible for its own basic computer services,
including packet routing, data forwarding, security, and privacy. Most of the protocols used in …
including packet routing, data forwarding, security, and privacy. Most of the protocols used in …
Non-conventional digital signatures and their implementations—a review
The current technological scenario determines a profileration of trust domains, which are
usually defined by validating the digital identity linked to each user. This validation entails …
usually defined by validating the digital identity linked to each user. This validation entails …
libgroupsig: An extensible C library for group signatures
One major need in the context of Privacy Enhancing Technologies (PETs) is to bridge
theoretical proposals and practical implementations. In order to foster easy deployment of …
theoretical proposals and practical implementations. In order to foster easy deployment of …