Transparency logs via append-only authenticated dictionaries

A Tomescu, V Bhupatiraju, D Papadopoulos… - Proceedings of the …, 2019 - dl.acm.org
Transparency logs allow users to audit a potentially malicious service, paving the way
towards a more accountable Internet. For example, Certificate Transparency (CT) enables …

A Verifiable Deletion Protocol for Enhancing Constraints on Public Clouds

Z Zhang, Y Zhu, J Wang, X Ding… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
Public cloud environments enable multi-party collaboration and data sharing but are also
prone to significant security challenges, particularly regarding verifiable data deletion …

Ticket transparency: Accountable single sign-on with privacy-preserving public logs

D Chu, J Lin, F Li, X Zhang, Q Wang, G Liu - International Conference on …, 2019 - Springer
Single sign-on (SSO) is becoming more and more popular in the Internet. An SSO ticket
issued by the identity provider (IdP) allows an entity to sign onto a relying party (RP) on …

Advanced Transparency System

Y Sun, Y Hu, Y Yu - Cryptology ePrint Archive, 2024 - eprint.iacr.org
In contemporary times, there are many situations where users need to verify that their
information is correctly retained by servers. At the same time, servers need to maintain …