A Blockchain-Based Conditional Anonymous Authentication Scheme
Abstract
References
Index Terms
- A Blockchain-Based Conditional Anonymous Authentication Scheme
Recommendations
P2A: Privacy Preserving Anonymous Authentication Based on Blockchain and SGX
Information Security and CryptologyAbstractModern Identify-as-a-Service solutions solve the problems of burdensome user credential management and non-uniform security strength, by introducing an Identity Provider (IdP) that holds the users’ identities and grants a user one-time access ...
Anonymous Authentication Scheme with Zero-Knowledge Proof Based on Private Blockchain
ICCNS '23: Proceedings of the 2023 13th International Conference on Communication and Network SecurityWith the continuous development of Internet of vehicles (IoV) services and the continuous influx of network users, how to solve the security and user privacy protection problems of IoV system has become a top priority. In this regard, based on the in-...
LaT-Voting: Traceable Anonymous E-Voting on Blockchain
Network and System SecurityAbstractIn order to achieve anonymous voting, various cryptographic techniques are usually leveraged to avoid privacy leakage. However, traditional e-voting systems are excessively dependent on a centralized platform for publishing voting activity and ...
Comments
Information & Contributors
Information
Published In

Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Funding Sources
- National Natural Science Foundation of China
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 53Total Downloads
- Downloads (Last 12 months)53
- Downloads (Last 6 weeks)6
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format