Blockchain-based identity management systems: A review

Y Liu, D He, MS Obaidat, N Kumar, MK Khan… - Journal of network and …, 2020 - Elsevier
Identity management solutions are generally designed to facilitate the management of digital
identities and operations such as authentication, and have been widely used in real-world …

Internet of things 2.0: Concepts, applications, and future directions

I Zhou, I Makhdoom, N Shariati, MA Raza… - IEEE …, 2021 - ieeexplore.ieee.org
Applications and technologies of the Internet of Things are in high demand with the increase
of network devices. With the development of technologies such as 5G, machine learning …

Group signatures with time-bound keys revisited: a new model, an efficient construction, and its implementation

K Emura, T Hayashi, A Ishida - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Chu et al.(ASIACCS 2012) proposed group signature with time-bound keys (GS-TBK),
where each signing key is associated with expiry time τ. In addition, to prove membership of …

Fair traceable multi-group signatures

V Benjumea, SG Choi, J Lopez, M Yung - Financial Cryptography and Data …, 2008 - Springer
This paper presents fair traceable multi-group signatures (FTMGS), which have enhanced
capabilities, compared to group and traceable signatures, that are important in real world …

Revocable group signature with constant-size revocation list

N Attrapadung, K Emura, G Hanaoka… - The Computer …, 2015 - academic.oup.com
It is essential that a multi-user cryptographic primitive be revocable since a legitimate user
may quit the organization, or may act on malicious intent, or the relevant key may be leaked …

Privacy preservation with X. 509 standard certificates

T Kwon - Information Sciences, 2011 - Elsevier
Privacy preservation has become an essential requirement in today's computing
environment; abuse based on anonymity and user-controlled pseudonyms is a serious …

Sybil-free pseudonyms, privacy and trust: Identity management in the internet of services

LA Martucci, S Ries, M Mühlhäser - Information and Media …, 2011 - jstage.jst.go.jp
We propose an identity management system that supports role-based pseudonyms that are
bound to a given set of services (service contexts) and support the use of reputation …

Identity and anonymity in ad hoc networks

LA Martucci - 2009 - diva-portal.org
In ad hoc networks every device is responsible for its own basic computer services,
including packet routing, data forwarding, security, and privacy. Most of the protocols used in …

Non-conventional digital signatures and their implementations—a review

D Arroyo, J Diaz, FB Rodriguez - … Joint Conference: CISIS'15 and ICEUTE' …, 2015 - Springer
The current technological scenario determines a profileration of trust domains, which are
usually defined by validating the digital identity linked to each user. This validation entails …

libgroupsig: An extensible C library for group signatures

J Diaz, D Arroyo, FB Rodriguez - Cryptology ePrint Archive, 2015 - eprint.iacr.org
One major need in the context of Privacy Enhancing Technologies (PETs) is to bridge
theoretical proposals and practical implementations. In order to foster easy deployment of …