Cancelable biometrics: A review

VM Patel, NK Ratha… - IEEE signal processing …, 2015 - ieeexplore.ieee.org
Recent years have seen an exponential growth in the use of various biometric technologies
for trusted automatic recognition of humans. With the rapid adaptation of biometric systems …

Cancelable biometrics: a comprehensive survey

Manisha, N Kumar - Artificial Intelligence Review, 2020 - Springer
Biometric recognition is a challenging research field but suffers from privacy and security
concerns. To address this concern, Cancelable Biometrics is suggested in literature in which …

Block-DEF: A secure digital evidence framework using blockchain

Z Tian, M Li, M Qiu, Y Sun, S Su - Information Sciences, 2019 - Elsevier
A secure digital evidence system should ensure that evidence cannot be tampered with and
that private information cannot be leaked. Blockchain, a distributed tamper-resistant and …

Ringct 2.0: A compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency monero

SF Sun, MH Au, JK Liu, TH Yuen - … , Oslo, Norway, September 11-15, 2017 …, 2017 - Springer
In this work, we initially study the necessary properties and security requirements of Ring
Confidential Transaction (RingCT) protocol deployed in the popular anonymous …

Zerocoin: Anonymous distributed e-cash from bitcoin

I Miers, C Garman, M Green… - 2013 IEEE symposium on …, 2013 - ieeexplore.ieee.org
Bitcoin is the first e-cash system to see widespread adoption. While Bitcoin offers the
potential for new types of financial interaction, it has significant limitations regarding privacy …

Bolt: Anonymous payment channels for decentralized currencies

M Green, I Miers - Proceedings of the 2017 ACM SIGSAC conference on …, 2017 - dl.acm.org
Bitcoin owes its success to the fact that transactions are transparently recorded in the
blockchain, a global public ledger that removes the need for trusted parties. Unfortunately …

B-ride: Ride sharing with privacy-preservation, trust and fair payment atop public blockchain

M Baza, N Lasla, MMEA Mahmoud… - … on Network Science …, 2019 - ieeexplore.ieee.org
Ride-sharing is a service that enables drivers to share trips with other riders, contributing to
appealing benefits of shared travel cost and reducing traffic congestion. However, the …

Snarky signatures: Minimal signatures of knowledge from simulation-extractable SNARKs

J Groth, M Maller - Annual International Cryptology Conference, 2017 - Springer
We construct a pairing based simulation-extractable SNARK (SE-SNARK) that consists of
only 3 group elements and has highly efficient verification. By formally linking SE-SNARKs to …

APPA: An anonymous and privacy preserving data aggregation scheme for fog-enhanced IoT

Z Guan, Y Zhang, L Wu, J Wu, J Li, Y Ma… - Journal of Network and …, 2019 - Elsevier
Fog computing is a modern computing platform that connects the cloud with the edge smart
devices located at the edge of the network. The fog computing platform has several …

Deco: Liberating web data using decentralized oracles for tls

F Zhang, D Maram, H Malvai, S Goldfeder… - Proceedings of the 2020 …, 2020 - dl.acm.org
Thanks to the widespread deployment of TLS, users can access private data over channels
with end-to-end confidentiality and integrity. What they cannot do, however, is prove to third …