2020
DOI: 10.1016/j.cose.2020.102069
|View full text |Cite
|
Sign up to set email alerts
|

AttriChain: Decentralized traceable anonymous identities in privacy-preserving permissioned blockchain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 37 publications
(11 citation statements)
references
References 5 publications
0
7
0
1
Order By: Relevance
“…The Zero Knowledge Proof is often used in a voting system [20], [33] [38], [41], [43], [45], [49], [56], [58], [62], [70], [74] to prove that the statement is indeed what it claims without revealing any additional information about the statement itself. In a voting system, the voter must convince the authority that his ballot is valid by proving that the ballot includes only one legitimate candidate without revealing his vote.…”
Section: Voting Encryption/hashing Algorithmsmentioning
confidence: 99%
See 2 more Smart Citations
“…The Zero Knowledge Proof is often used in a voting system [20], [33] [38], [41], [43], [45], [49], [56], [58], [62], [70], [74] to prove that the statement is indeed what it claims without revealing any additional information about the statement itself. In a voting system, the voter must convince the authority that his ballot is valid by proving that the ballot includes only one legitimate candidate without revealing his vote.…”
Section: Voting Encryption/hashing Algorithmsmentioning
confidence: 99%
“…[20]- [26], [26]- [29], [31], [32], [34], [35], [53], [63]- [66], [68], [75], [84], [87], [90]- [92] Voter Verifiable [19]- [26], [26]- [28], [31]- [35], [53], [63]- [65], [68], [75], [76], [84], [87], [91], [92] [20], [40], [41], [43]- [45], [47], [49]- [52], [57]- [60], [62], [74], [80], [85], [93]- [97] Vote-Alterable [21], [24]- [26], [26],…”
Section: Properties Papers Auditmentioning
confidence: 99%
See 1 more Smart Citation
“…In the same year, Kaaniche and Laurent [47] presented a cryptographic technique using blockchain technology to enable availability and accountability, whilst preserving privacy-preservation, in a a data usage auditing architecture. Recently, Shao et al [48] achieved unlinkability and anonymity for transactions of a legitimate user in a blockchain whereas malicious users can be identified in a framework called AttriChain. Recently, Halpin introduced Nym credentials as a novel method to deploy anonymous authentication credentials to preserve user privacy in a blockchain environment [49].…”
Section: ) Security Enhancement Techniquesmentioning
confidence: 99%
“…Other research works are focused on using Blockchain as IMS such as in [32] where a Blockchain-based Personally Identifiable Information Management System (BcPIIMS) is designed for PII management throughout organizations, in [49] where attribute managed user identities are certified and controled by authorities or in [50] for specific pre-created and permissioned groups of users.…”
Section: Background Study a Personally Identifiable Informationmentioning
confidence: 99%