Blockchain-based Off-chain Extension Model for Geographic Information Data
Abstract
References
Index Terms
- Blockchain-based Off-chain Extension Model for Geographic Information Data
Recommendations
Poster: Blockchain-Envisioned Secure Generic Communication Framework using Signcryption
SACMAT '22: Proceedings of the 27th ACM on Symposium on Access Control Models and TechnologiesWe aim at building a generic future-generation, secure communication framework on top of blockchain using signcryption. A publicly verifiable signcryption scheme not only ensures data confidentiality and authentication, but also enables messages to be ...
IND-CCA secure encryption based on a Zheng-Seberry scheme
In 1993, Zheng and Seberry proposed three methods for strengthening public key cryptosystems. These methods aimed to obtain schemes that are secure against adaptively chosen ciphertext attacks. One method was improving security by using digital ...
Research on data access scheme based on attribute-based encryption in blockchain environment
ICCBN '23: Proceedings of the 2023 11th International Conference on Communications and Broadband NetworkingAccess control on shared data can limit illegal access and improve data privacy and security. Attribute-based encryption is one of the key technologies to realize fine-grained access control of data. Traditional access control schemes usually rely on ...
Comments
Information & Contributors
Information
Published In

Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 23Total Downloads
- Downloads (Last 12 months)23
- Downloads (Last 6 weeks)7
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format