Threshold signatures with private accountability

D Boneh, C Komlo - Annual International Cryptology Conference, 2022 - Springer
Existing threshold signature schemes come in two flavors:(i) fully private, where the
signature reveals nothing about the set of signers that generated the signature, and (ii) …

Secure multi-party computation-based privacy-preserving authentication for smart cities

V Sucasas, A Aly, G Mantas… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The increasing concern for identity confidentiality in the Smart City scenario has fostered
research on privacy-preserving authentication based on pseudonymization. Pseudonym …

Trust model for secure group leader-based communications in VANET

H Hasrouny, AE Samhat, C Bassil, A Laouiti - Wireless Networks, 2019 - Springer
VANET aims to improve safety for all road users. Vehicles exchange safety messages over
wireless communication links which are prone to multiple attacks. To enhance the existing …

A2RID—Anonymous Direct Authentication and Remote Identification of Commercial Drones

E Wisse, P Tedeschi, S Sciancalepore… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
The recent worldwide introduction of RemoteID (RID) regulations forces all unmanned
aircrafts (UAs), also known as drones, to broadcast in plaintext on the wireless channel their …

SPPEAR: security & privacy-preserving architecture for participatory-sensing applications

S Gisdakis, T Giannetsos… - Proceedings of the 2014 …, 2014 - dl.acm.org
Recent advances in sensing, computing, and networking have paved the way for the
emerging paradigm of participatory sensing (PS). The openness of such systems and the …

A signature scheme with unlinkable-yet-accountable pseudonymity for privacy-preserving crowdsensing

V Sucasas, G Mantas, J Bastos… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Crowdsensing requires scalable privacy-preserving authentication that allows users to send
anonymously sensing reports, while enabling eventual anonymity revocation in case of user …

Fast revocation of attribute-based credentials for both users and verifiers

W Lueks, G Alpár, JH Hoepman, P Vullers - computers & security, 2017 - Elsevier
Attribute-based credentials allow a user to prove properties about herself anonymously.
Revoking such credentials, which requires singling them out, is hard because it is at odds …

Secure and privacy-preserving smartphone-based traffic information systems

S Gisdakis, V Manolopoulos, S Tao… - IEEE Transactions …, 2014 - ieeexplore.ieee.org
Increasing smartphone penetration, combined with the wide coverage of cellular
infrastructures, renders smartphone-based traffic information systems (TISs) an attractive …

A survey of quantum secure group signature schemes: Lattice-based approach

MS Şahin, S Akleylek - Journal of Information Security and Applications, 2023 - Elsevier
The group signatures allow any member to sign the message on behalf of the group. While
anyone who does not need to be a group member can verify the signature, they do not know …

Certificate revocation schemes in vehicular networks: A survey

Q Wang, D Gao, D Chen - IEEE Access, 2020 - ieeexplore.ieee.org
The problem of security in vehicular networks is a vital issue and attracts researchers'
increasing attention for its unique characteristics, such as the vulnerability of wireless media …