Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey

S Ullah, J Zheng, N Din, MT Hussain, F Ullah… - Computer Science …, 2023 - Elsevier
Elliptic Curve (EC) is the most recent and advanced technique of Elliptic Curve
Cryptography (ECC). EC is often used to improve the security of open communication …

Security, privacy, and decentralized trust management in VANETs: A review of current research and future directions

M AlMarshoud, M Sabir Kiraz, A H. Al-Bayatti - ACM Computing Surveys, 2024 - dl.acm.org
Vehicular Ad Hoc Networks (VANETs) are powerful platforms for vehicular data services and
applications. The increasing number of vehicles has made the vehicular network diverse …

Indistinguishability obfuscation from well-founded assumptions

A Jain, H Lin, A Sahai - Proceedings of the 53rd annual ACM SIGACT …, 2021 - dl.acm.org
Indistinguishability obfuscation, introduced by [Barak et. al. Crypto 2001], aims to compile
programs into unintelligible ones while preserving functionality. It is a fascinating and …

Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks

K Gai, Y Wu, L Zhu, L Xu… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
The blooming trend of smart grid deployment is engaged by the evolution of the network
technology, as the connected environment offers various alternatives for electrical data …

On the size of pairing-based non-interactive arguments

J Groth - Advances in Cryptology–EUROCRYPT 2016: 35th …, 2016 - Springer
Non-interactive arguments enable a prover to convince a verifier that a statement is true.
Recently there has been a lot of progress both in theory and practice on constructing highly …

[HTML][HTML] Secure authentication and privacy-preserving techniques in Vehicular Ad-hoc NETworks (VANETs)

D Manivannan, SS Moni, S Zeadally - Vehicular Communications, 2020 - Elsevier
In the last decade, there has been growing interest in Vehicular Ad Hoc NETworks
(VANETs). Today car manufacturers have already started to equip vehicles with …

Redactable blockchain–or–rewriting history in bitcoin and friends

G Ateniese, B Magri, D Venturi… - 2017 IEEE European …, 2017 - ieeexplore.ieee.org
We put forward a new framework that makes it possible to re-write or compress the content
of any number of blocks in decentralized services exploiting the blockchain technology. As …

On identity, transaction, and smart contract privacy on permissioned and permissionless blockchain: A comprehensive survey

W Liang, Y Liu, C Yang, S **e, K Li, W Susilo - ACM Computing Surveys, 2024 - dl.acm.org
Blockchain is a decentralized distributed ledger that combines multiple technologies,
including chain data structures, P2P networks, consensus algorithms, cryptography, and …

Blockchain-based secure data storage protocol for sensors in the industrial internet of things

J Lu, J Shen, P Vijayakumar… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The Industrial Internet of Things (IIoT) that introduces Internet of Things (IoT) technology into
industrial environments is beneficial to construct smart factories. It utilizes various sensors to …

A secure authentication framework to guarantee the traceability of avatars in metaverse

K Yang, Z Zhang, T Youliang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Metaverse is a vast virtual environment parallel to the physical world in which users enjoy a
variety of services acting as an avatar. To build a secure living habitat, it's vital to ensure the …