Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (1,636)

Search Parameters:
Keywords = data privacy protection

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
21 pages, 6584 KB  
Article
Diffusion-Based Anonymization and Foundation Model-Powered Semi-Automatic Image Annotation for Privacy-Protective Intelligent Connected Vehicle Traffic Data
by Tong Wang, Hui Xie, Feng Gao, Zian Meng, Pengcheng Zhang and Guohao Duan
World Electr. Veh. J. 2026, 17(2), 70; https://doi.org/10.3390/wevj17020070 (registering DOI) - 31 Jan 2026
Abstract
Large-scale collection and annotation of sensitive facial data in real-world traffic scenarios face significant hurdles regarding privacy protection, temporal consistency, and high costs. To address these issues, this work proposes an integrated method specifically designed for sensitive information anonymization and semi-automatic image annotation [...] Read more.
Large-scale collection and annotation of sensitive facial data in real-world traffic scenarios face significant hurdles regarding privacy protection, temporal consistency, and high costs. To address these issues, this work proposes an integrated method specifically designed for sensitive information anonymization and semi-automatic image annotation (AIA). Specifically, the Nullface anonymization model is applied to remove identity information from facial data while preserving non-identity attributes including pose, expression, and background that are relevant to downstream vision tasks. Secondly, the Qwen3-VL multimodal foundation model is combined with the Grounding DINO detection model to build an end-to-end annotation platform using the Dify workflow, covering data cleaning and automated labeling. A traffic-sensitive information dataset with diverse and complex backgrounds is then constructed. Subsequently, the systematic experiments on the WIDER FACE subset show that Nullface significantly outperforms baseline methods including FAMS and Ciagan in head pose preservation and image quality. Finally, evaluation on object detection further confirms the effectiveness of the proposed approach. The accuracy achieved by the proposed method reaches 91.05%, outperforming AWS, and is almost identical to the accuracy of manual annotation. This demonstrates that the anonymization process maintains critical semantic details required for effective object detection. Full article
(This article belongs to the Special Issue Recent Advances in Intelligent Vehicle)
Show Figures

Figure 1

19 pages, 1524 KB  
Article
A Trajectory Privacy Protection Scheme Based on the Replacement of Stay Points
by Wanqing Wu and Delong Li
Appl. Sci. 2026, 16(3), 1391; https://doi.org/10.3390/app16031391 - 29 Jan 2026
Abstract
Location-based services generate a large amount of location and trajectory data, which contain rich spatiotemporal and semantic information. Publishing these data without proper protection can seriously threaten users’ trajectory privacy. Existing trajectory privacy protection schemes generally fail to consider the dependency between a [...] Read more.
Location-based services generate a large amount of location and trajectory data, which contain rich spatiotemporal and semantic information. Publishing these data without proper protection can seriously threaten users’ trajectory privacy. Existing trajectory privacy protection schemes generally fail to consider the dependency between a stay point and its preceding location and also overlook the relationship between the semantic information of location and privacy. Moreover, they often suffer from issues such as over-protection. Therefore, this paper proposes a trajectory privacy protection scheme based on the replacement of stay points. First, a stay point extraction algorithm is proposed, which extracts users’ stay points by setting distance and time thresholds based on the principle of the sliding window. Then, this paper proposes a location perturbation algorithm based on the vector indistinguishability mechanism and introduces different protection strategies for ordinary stay points and long-duration stay points, respectively. Finally, the perturbed trajectory is adjusted by generating a certain number of location points near the replacement points to maintain the temporal continuity and integrity of the trajectory. The experimental results indicate that it is necessary to provide more meticulous protection for long-duration stay points. Compared with similar schemes, the proposed scheme in this paper achieves higher data utility while ensuring privacy. Full article
19 pages, 473 KB  
Article
Privacy Protection Optimization Method for Cloud Platforms Based on Federated Learning and Homomorphic Encryption
by Jing Wang and Yun Wang
Sensors 2026, 26(3), 890; https://doi.org/10.3390/s26030890 - 29 Jan 2026
Viewed by 31
Abstract
With the wide application of cloud computing in multi-tenant, heterogeneous nodes and high-concurrency environments, model parameters frequently interact during distributed training, which easily leads to privacy leakage, communication redundancy, and decreased aggregation efficiency. To realize the collaborative optimization of privacy protection and computing [...] Read more.
With the wide application of cloud computing in multi-tenant, heterogeneous nodes and high-concurrency environments, model parameters frequently interact during distributed training, which easily leads to privacy leakage, communication redundancy, and decreased aggregation efficiency. To realize the collaborative optimization of privacy protection and computing performance, this study proposes the Heterogeneous Federated Homomorphic Encryption Cloud (HFHE-Cloud) model, which integrates federated learning (FL) and homomorphic encryption and constructs a secure and efficient collaborative learning framework for cloud platforms. Under the condition of not exposing the original data, the model effectively reduces the performance bottleneck caused by encryption calculation and communication delay through hierarchical key mapping and dynamic scheduling mechanism of heterogeneous nodes. The experimental results show that HFHE-Cloud is significantly superior to Federated Averaging (FedAvg), Federated Proximal (FedProx), Federated Personalization (FedPer) and Federated Normalized Averaging (FedNova) in comprehensive performance, Homomorphically Encrypted Federated Averaging (HE-FedAvg) and other five baseline models. In the dimension of privacy protection, the global accuracy is up to 94.25%, and the Loss is stable within 0.09. In terms of computing performance, the encryption and decryption time is shortened by about one third, and the encryption overhead is controlled at 13%. In terms of distributed training efficiency, the number of communication rounds is reduced by about one fifth, and the node participation rate is stable at over 90%. The results verify the model’s ability to achieve high security and high scalability in multi-tenant environment. This study aims to provide cloud service providers and enterprise data holders with a technical solution of high-intensity privacy protection and efficient collaborative training that can be deployed in real cloud platforms. Full article
(This article belongs to the Section Sensor Networks)
20 pages, 646 KB  
Article
From Framework to Reliable Practice: End-User Perspectives on Social Robots in Public Spaces
by Samson Ogheneovo Oruma, Ricardo Colomo-Palacios and Vasileios Gkioulos
Systems 2026, 14(2), 137; https://doi.org/10.3390/systems14020137 - 29 Jan 2026
Viewed by 58
Abstract
As social robots increasingly enter public environments, their acceptance depends not only on technical robustness but also on ethical integrity, accessibility, transparency, and consistent system behaviour across diverse users. This paper reports an in situ pilot deployment of an ARI social robot functioning [...] Read more.
As social robots increasingly enter public environments, their acceptance depends not only on technical robustness but also on ethical integrity, accessibility, transparency, and consistent system behaviour across diverse users. This paper reports an in situ pilot deployment of an ARI social robot functioning as a university receptionist, designed and implemented in alignment with the SecuRoPS framework for secure, ethical, and reliable social robot deployment. Thirty-five students and staff interacted with the robot in a real public setting and provided structured feedback on safety, privacy, usability, accessibility, ethical transparency, and perceived reliability. The results indicate strong user confidence in physical safety, data protection, and regulatory compliance while revealing persistent challenges related to accessibility and interaction dynamics. These findings show that reliability in public-facing robotic systems extends beyond fault-free operation to include equitable and consistent user experience across contexts. Beyond reporting empirical outcomes, the study contributes in three key ways. First, it demonstrates a reproducible method for operationalising lifecycle governance frameworks in real-world deployments. Second, it provides new empirical insights into how trust, accessibility, and transparency are experienced by end users in public spaces. Third, it delivers a publicly available, open-source GitHubrepository containing reusable templates for ARI robot applications developed using the PAL Robotics ARI SDK (v23.12), lowering technical entry barriers and supporting reproducibility. By integrating empirical evaluation with practical system artefacts, this work advances research on reliable intelligent environments and provides actionable guidance for the responsible deployment of social robots in public spaces. Full article
Show Figures

Figure 1

15 pages, 661 KB  
Article
Assessing the Determinants of Behavioural Cybersecurity in Healthcare: A Study of Patient Health Application Users in Saudi Arabia
by Alghaliyah Alharbi, Hasan Mansur, Manahil Alfuraydan and Thabit Atobishi
Big Data Cogn. Comput. 2026, 10(2), 42; https://doi.org/10.3390/bdcc10020042 - 29 Jan 2026
Viewed by 79
Abstract
Cybersecurity has become one of the top priorities in Saudi Arabia, playing a key role in achieving Vision 2030 and advancing the kingdom’s position in digital transformation. This study investigates how cybersecurity knowledge, attitudes, and awareness influence user behaviours in health applications within [...] Read more.
Cybersecurity has become one of the top priorities in Saudi Arabia, playing a key role in achieving Vision 2030 and advancing the kingdom’s position in digital transformation. This study investigates how cybersecurity knowledge, attitudes, and awareness influence user behaviours in health applications within Saudi Arabia. An online cross-sectional survey was distributed between March and April 2025 among Saudi Arabian residents. The collected data (n = 629) were analyzed using Smart PLS Structural Equation Modelling (SEM) to assess the relationships among the study constructs. The majority of the participants (61.4%) were between the age of 18 and 24, and 87.6% reported using health applications such as Sehhaty or Labayh to manage their health information. Results demonstrated that all three constructs significantly predicted cybersecurity behaviours: knowledge showed the strongest influence (β = 0.372), followed by attitude (β = 0.343) and awareness (β = 0.199), with all paths being statistically significant (p < 0.05). The model explained substantial variance in cybersecurity behaviours. Knowledge, attitude, and awareness significantly predict cybersecurity practices in healthcare application contexts. Findings highlight the critical need for targeted educational interventions focusing on cybersecurity knowledge enhancement and awareness programmes to promote safer digital health behaviours and strengthen patient data protection in Saudi Arabia’s healthcare system. Full article
(This article belongs to the Special Issue Big Data Analytics with Machine Learning for Cyber Security)
Show Figures

Figure 1

24 pages, 5682 KB  
Article
An Ontology-Driven Digital Twin for Hotel Front Desk: Real-Time Integration of Wearables and OCC Camera Events via a Property-Defined REST API
by Moises Segura-Cedres, Desiree Manzano-Farray, Carmen Lidia Aguiar-Castillo, Rafael Perez-Jimenez, Vicente Matus Icaza, Eleni Niarchou and Victor Guerra-Yanez
Electronics 2026, 15(3), 567; https://doi.org/10.3390/electronics15030567 - 28 Jan 2026
Viewed by 144
Abstract
This article presents an ontology-driven Digital Twin (DT) for hotel front-desk operations that fuses two real-time data streams: (i) physiological and activity signals from wrist-worn wearables assigned to staff, and (ii) 3D people-positioning and occupancy events captured by reception-area cameras using a proprietary [...] Read more.
This article presents an ontology-driven Digital Twin (DT) for hotel front-desk operations that fuses two real-time data streams: (i) physiological and activity signals from wrist-worn wearables assigned to staff, and (ii) 3D people-positioning and occupancy events captured by reception-area cameras using a proprietary implementation of Optical Camera Communication (OCC). Building on a previously proposed front-desk ontology, the semantic model is extended with positional events, zone semantics, and wearable-derived workload indices to estimate queue state, staff workload, and service demand in real time. A vendor-agnostic, property-based REST API specifies the DT interface in terms of observable properties, including authentication and authorization, idempotent ingestion, timestamp conventions, version negotiation, integrity protection for signed webhooks, rate limiting and backoff, pagination and filtering, and privacy-preserving identifiers, enabling any compliant backend to implement the specification. The proposed layered architecture connects ingestion, spatial reasoning, and decision services to dashboards and key performance indicators (KPIs). This article details the positioning pipeline (calibration, normalized 3D coordinates, zone mapping, and confidence handling), the wearable workload pipeline, and an evaluation protocol covering localization error, zone classification, queue-length estimation, and workload accuracy. The results indicate that a spatially aware, ontology-based DT can support more balanced staff allocation and improved guest experience while remaining technology-agnostic and privacy-conscious. Full article
Show Figures

Figure 1

20 pages, 733 KB  
Systematic Review
Federated Learning in Healthcare Ethics: A Systematic Review of Privacy-Preserving and Equitable Medical AI
by Bilal Ahmad Mir, Syed Raza Abbas and Seung Won Lee
Healthcare 2026, 14(3), 306; https://doi.org/10.3390/healthcare14030306 - 26 Jan 2026
Viewed by 178
Abstract
Background/Objectives: Federated learning (FL) offers a way for healthcare institutions to collaboratively train machine learning models without sharing sensitive patient data. This systematic review aims to comprehensively synthesize the ethical dimensions of FL in healthcare, integrating privacy preservation, algorithmic fairness, governance, and [...] Read more.
Background/Objectives: Federated learning (FL) offers a way for healthcare institutions to collaboratively train machine learning models without sharing sensitive patient data. This systematic review aims to comprehensively synthesize the ethical dimensions of FL in healthcare, integrating privacy preservation, algorithmic fairness, governance, and equitable access into a unified analytical framework. The application of FL in healthcare between January 2020 and December 2024 is examined, with a focus on ethical issues such as algorithmic fairness, privacy preservation, governance, and equitable access. Methods: Following PRISMA guidelines, six databases (PubMed, IEEE Xplore, Web of Science, Scopus, ACM Digital Library, and arXiv) were searched. The PROSPERO registration is CRD420251274110. Studies were selected if they described FL implementations in healthcare settings and explicitly discussed ethical considerations. Key data extracted included FL architectures, privacy-preserving mechanisms, such as differential privacy, secure multiparty computation, and encryption, as well as fairness metrics, governance models, and clinical application domains. Results: Out of 3047 records, 38 met the inclusion criteria. The most popular applications were found in medical imaging and electronic health records, especially in radiology and oncology. Through thematic analysis, four key ethical themes emerged: algorithmic fairness, which addresses differences between clients and attributes; privacy protection through formal guarantees and cryptographic techniques; governance models, which emphasize accountability, transparency, and stakeholder engagement; and equitable distribution of computing resources for institutions with limited resources. Considerable variation was observed in how fairness and privacy trade-offs were evaluated, and only a few studies reported real-world clinical deployment. Conclusions: FL has significant potential to promote ethical AI in healthcare, but advancement will require the development of common fairness standards, workable governance plans, and systems to guarantee fair benefit sharing. Future studies should develop standardized fairness metrics, implement multi-stakeholder governance frameworks, and prioritize real-world clinical validation beyond proof-of-concept implementations. Full article
Show Figures

Figure 1

26 pages, 3900 KB  
Review
A Survey on the Computing Continuum and Meta-Operating Systems: Perspectives, Architectures, Outcomes, and Open Challenges
by Panagiotis K. Gkonis, Anastasios Giannopoulos, Nikolaos Nomikos, Lambros Sarakis, Vasileios Nikolakakis, Gerasimos Patsourakis and Panagiotis Trakadas
Sensors 2026, 26(3), 799; https://doi.org/10.3390/s26030799 - 25 Jan 2026
Viewed by 218
Abstract
The goal of the study presented in this work is to analyze all recent advances in the context of the computing continuum and meta-operating systems (meta-OSs). The term continuum includes a variety of diverse hardware and computing elements, as well as network protocols, [...] Read more.
The goal of the study presented in this work is to analyze all recent advances in the context of the computing continuum and meta-operating systems (meta-OSs). The term continuum includes a variety of diverse hardware and computing elements, as well as network protocols, ranging from lightweight Internet of Things (IoT) components to more complex edge or cloud servers. To this end, the rapid penetration of IoT technology in modern-era networks, along with associated applications, poses new challenges towards efficient application deployment over heterogeneous network infrastructures. These challenges involve, among others, the interconnection of a vast number of IoT devices and protocols, proper resource management, and threat protection and privacy preservation. Hence, unified access mechanisms, data management policies, and security protocols are required across the continuum to support the vision of seamless connectivity and diverse device integration. This task becomes even more important as discussions on sixth generation (6G) networks are already taking place, which they are envisaged to coexist with IoT applications. Therefore, in this work the most significant technological approaches to satisfy the aforementioned challenges and requirements are presented and analyzed. To this end, a proposed architectural approach is also presented and discussed, which takes into consideration all key players and components in the continuum. In the same context, indicative use cases and scenarios that are leveraged from a meta-OSs in the computing continuum are presented as well. Finally, open issues and related challenges are also discussed. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

29 pages, 1072 KB  
Systematic Review
Ethical Responsibility in Medical AI: A Semi-Systematic Thematic Review and Multilevel Governance Model
by Domingos Martinho, Pedro Sobreiro, Andreia Domingues, Filipa Martinho and Nuno Nogueira
Healthcare 2026, 14(3), 287; https://doi.org/10.3390/healthcare14030287 - 23 Jan 2026
Viewed by 262
Abstract
Background: Artificial intelligence (AI) is transforming medical practice, enhancing diagnostic accuracy, personalisation, and clinical efficiency. However, this transition raises complex ethical challenges related to transparency, accountability, fairness, and human oversight. This study examines how the literature conceptualises and distributes ethical responsibility in [...] Read more.
Background: Artificial intelligence (AI) is transforming medical practice, enhancing diagnostic accuracy, personalisation, and clinical efficiency. However, this transition raises complex ethical challenges related to transparency, accountability, fairness, and human oversight. This study examines how the literature conceptualises and distributes ethical responsibility in AI-assisted healthcare. Methods: This semi-systematic, theory-informed thematic review was conducted in accordance with the PRISMA 2020 guidelines. Publications from 2020 to 2025 were retrieved from PubMed, ScienceDirect, IEEE Xplore databases, and MDPI journals. A semi-quantitative keyword-based scoring model was applied to titles and abstracts to determine their relevance. High-relevance studies (n = 187) were analysed using an eight-category ethical framework: transparency and explainability, regulatory challenges, accountability, justice and equity, patient autonomy, beneficence–non-maleficence, data privacy, and the impact on the medical profession. Results: The analysis revealed a fragmented ethical landscape in which technological innovation frequently outperforms regulatory harmonisation and shared accountability structures. Transparency and explainability were the dominant concerns (34.8%). Significant gaps in organisational responsibility, equitable data practices, patient autonomy, and professional redefinition were reported. A multilevel ethical responsibility model was developed, integrating micro (clinical), meso (institutional), and macro (regulatory) dimensions, articulated through both ex ante and ex post perspectives. Conclusions: AI requires governance frameworks that integrate ethical principles, regulatory alignment, and epistemic justice in medicine. This review proposes a multidimensional model that bridges normative ethics and operational governance. Future research should explore empirical, longitudinal, and interdisciplinary approaches to assess the real impact of AI on clinical practice, equity, and trust. Full article
Show Figures

Figure 1

19 pages, 480 KB  
Article
Acceptance and Use of Generative Artificial Intelligence in Higher Education: A UTAUT-Based Model Integrating Trust and Privacy
by Lidija Weis, Julija Lapuh Bele and Vanja Erčulj
Educ. Sci. 2026, 16(2), 173; https://doi.org/10.3390/educsci16020173 - 23 Jan 2026
Viewed by 313
Abstract
The rapid emergence of generative artificial intelligence (GAI) is reshaping academic work in higher education. While classical technology acceptance models primarily emphasize cognitive and instrumental determinants, the adoption of GAI also raises ethical concerns related to trust in AI systems and the protection [...] Read more.
The rapid emergence of generative artificial intelligence (GAI) is reshaping academic work in higher education. While classical technology acceptance models primarily emphasize cognitive and instrumental determinants, the adoption of GAI also raises ethical concerns related to trust in AI systems and the protection of personal and institutional data. To address this gap, this study examines the determinants of GAI acceptance and use among academic staff in Slovenian higher education institutions by applying a UTAUT-based model that integrates trust and privacy. In this study, GAI is conceptualized as a class of text-based generative AI tools commonly used in academic practice, including applications such as ChatGPT, Copilot, Scholar AI, Gemini, Consensus, and similar systems. A quantitative research design was employed, based on a structured online survey administered to academic staff across 20 higher education institutions in Slovenia (n = 201). Data were analyzed using multilevel confirmatory factor analysis and generalized estimating equations. The results indicate that performance expectancy and attitude toward using significantly predict behavioral intention to use GAI (B = 0.49, p < 0.001 for both), while behavioral intention is the primary predictor of actual use behavior (B = 0.93, p < 0.001). Effort expectancy is positively associated with use behavior independent of behavioral intention (B = 0.23, p = 0.012), whereas trust does not show a statistically significant association with use behavior (B = 0.05, p = 0.458) or behavioral intention (B = −0.01, p = 0.840). Privacy exhibits a positive, but non-statistically significant, association with use behavior (B = 0.12, p = 0.058). The findings highlight the relevance of considering both cognitive and ethical factors when examining generative AI adoption in academic contexts and provide initial empirical insights for refining UTAUT-based frameworks in the context of emerging AI technologies. Full article
(This article belongs to the Topic AI Trends in Teacher and Student Training)
Show Figures

Figure 1

19 pages, 1193 KB  
Review
Tactical-Grade Wearables and Authentication Biometrics
by Fotios Agiomavritis and Irene Karanasiou
Sensors 2026, 26(3), 759; https://doi.org/10.3390/s26030759 - 23 Jan 2026
Viewed by 174
Abstract
Modern battlefield operations require wearable technologies to operate reliably under harsh physical, environmental, and security conditions. This review looks at today and tomorrow’s potential for ready field-grade wearables embedded with biometric authentication systems. It details physiological, kinematic, and multimodal sensor platforms built to [...] Read more.
Modern battlefield operations require wearable technologies to operate reliably under harsh physical, environmental, and security conditions. This review looks at today and tomorrow’s potential for ready field-grade wearables embedded with biometric authentication systems. It details physiological, kinematic, and multimodal sensor platforms built to withstand rugged, high-stress environments, and reviews biometric modalities like ECG, PPG, EEG, gait, and voice for continuous or on-demand identity confirmation. Accuracy, latency, energy efficiency, and tolerance to motion artifacts, environmental extremes, and physiological variability are critical performance drivers. Security threats, such as spoofing and data tapping, and techniques for template protection, liveness assurance, and protected on-device processing also come under review. Emerging trends in low-power edge AI, multimodal integration, adaptive learning from field experience, and privacy-preserving analytics in terms of defense readiness, and ongoing challenges, such as gear interoperability, long-term stability of templates, and common stress-testing protocols, are assessed. In conclusion, an R&D plan to lead the development of rugged, trustworthy, and operationally validated wearable authentication systems for the current and future militaries is proposed. Full article
(This article belongs to the Special Issue Biomedical Electronics and Wearable Systems—2nd Edition)
Show Figures

Figure 1

41 pages, 1318 KB  
Article
Probabilistic Bit-Similarity-Based Key Agreement Protocol Employing Fuzzy Extraction for Secure and Lightweight Wireless Sensor Networks
by Sofia Sakka, Vasiliki Liagkou, Yannis Stamatiou and Chrysostomos Stylios
J. Cybersecur. Priv. 2026, 6(1), 22; https://doi.org/10.3390/jcp6010022 - 22 Jan 2026
Viewed by 131
Abstract
Wireless sensor networks comprise many resource-constrained nodes that must protect both local readings and routing metadata. The sensors collect data from the environment or from the individual to whom they are attached and transmit it to the nearest gateway node via a wireless [...] Read more.
Wireless sensor networks comprise many resource-constrained nodes that must protect both local readings and routing metadata. The sensors collect data from the environment or from the individual to whom they are attached and transmit it to the nearest gateway node via a wireless network for further delivery to external users. Due to wireless communication, the transmitted messages may be intercepted, rerouted, or even modified by an attacker. Consequently, security and privacy issues are of utmost importance, and the nodes must be protected against unauthorized access during transmission over a public wireless channel. To address these issues, we propose the Probabilistic Bit-Similarity-Based Key Agreement Protocol (PBS-KAP). This novel method enables two nodes to iteratively converge on a shared secret key without transmitting it or relying on pre-installed keys. PBS-KAP enables two nodes to agree on a symmetric session key using probabilistic similarity alignment with explicit key confirmation (MAC). Optimized Garbled Circuits facilitate secure computation with minimal computational and communication overhead, while Secure Sketches combined with Fuzzy Extractors correct residual errors and amplify entropy, producing reliable and uniformly random session keys. The resulting protocol provides a balance between security, privacy, and usability, standing as a practical solution for real-world WSN and IoT applications without imposing excessive computational or communication burdens. Security relies on standard computational assumptions via a one-time elliptic–curve–based base Oblivious Transfer, followed by an IKNP Oblivious Transfer extension and a small garbled threshold circuit. No pre-deployed long-term keys are required. After the bootstrap, only symmetric operations are used. We analyze confidentiality in the semi-honest model. However, entity authentication, though feasible, requires an additional Authenticated Key Exchange step or malicious-secure OT/GC. Under the semi-honest OT/GC assumption, we prove session-key secrecy/indistinguishability; full entity authentication requires an additional AKE binding step or malicious-secure OT/GC. Full article
(This article belongs to the Special Issue Data Protection and Privacy)
Show Figures

Figure 1

26 pages, 911 KB  
Article
Logarithmic-Size Post-Quantum Linkable Ring Signatures Based on Aggregation Operations
by Minghui Zheng, Shicheng Huang, Deju Kong, Xing Fu, Qiancheng Yao and Wenyi Hou
Entropy 2026, 28(1), 130; https://doi.org/10.3390/e28010130 - 22 Jan 2026
Viewed by 85
Abstract
Linkable ring signatures are a type of ring signature scheme that can protect the anonymity of signers while allowing the public to verify whether the same signer has signed the same message multiple times. This functionality makes linkable ring signatures suitable for applications [...] Read more.
Linkable ring signatures are a type of ring signature scheme that can protect the anonymity of signers while allowing the public to verify whether the same signer has signed the same message multiple times. This functionality makes linkable ring signatures suitable for applications such as cryptocurrencies and anonymous voting systems, achieving the dual goals of identity privacy protection and misuse prevention. However, existing post-quantum linkable ring signature schemes often suffer from issues such as excessive linear data growth the adoption of post-quantum signature algorithms, and high circuit complexity resulting from the use of post-quantum zero-knowledge proof protocols. To address these issues, a logarithmic-size post-quantum linkable ring signature scheme based on aggregation operations is proposed. The scheme constructs a Merkle tree from ring members’ public keys via a hash algorithm to achieve logarithmic-scale signing and verification operations. Moreover, it introduces, for the first time, a post-quantum aggregate signature scheme to replace post-quantum zero-knowledge proof protocols, thereby effectively avoiding the construction of complex circuits. Scheme analysis confirms that the proposed scheme meets the correctness requirements of linkable ring signatures. In terms of security, the scheme satisfies the anonymity, unforgeability, and linkability requirements of linkable ring signatures. Moreover, the aggregation process does not leak information about the signing members, ensuring strong privacy protection. Experimental results demonstrate that, when the ring size scales to 1024 members, our scheme outperforms the existing Dilithium-based logarithmic post-quantum ring signature scheme, with nearly 98.25% lower signing time, 98.90% lower verification time, and 99.81% smaller signature size. Full article
(This article belongs to the Special Issue Quantum Information Security)
Show Figures

Figure 1

42 pages, 6277 KB  
Article
Process-Aware Selective Disclosure and Identity Unlinkability: A Tag-Based Interoperability-Enhancing Digital Identity Framework and Its Application to Logistics Transportation Workflows
by Junliang Liu, Zhiyao Liang and Qiuyun Lyu
Electronics 2026, 15(2), 473; https://doi.org/10.3390/electronics15020473 - 22 Jan 2026
Viewed by 82
Abstract
This paper proposes a process-aware, tag-based digital identity framework that enhances interoperability while enabling identity unlinkability and selective disclosure across multi-party workflows involving sensitive data. We realize this framework within the self-sovereign identity (SSI) paradigm, employing zk-SNARK–based zero-knowledge proofs to enable verifiable identity [...] Read more.
This paper proposes a process-aware, tag-based digital identity framework that enhances interoperability while enabling identity unlinkability and selective disclosure across multi-party workflows involving sensitive data. We realize this framework within the self-sovereign identity (SSI) paradigm, employing zk-SNARK–based zero-knowledge proofs to enable verifiable identity authentication without plaintext disclosure. The framework introduces a protocol-tagging mechanism to support multiple proof systems within a unified architecture, thereby enhancing SSI scalability and interoperability. Its core innovation lies in combining identity unlinkability and process-driven data disclosure: derived sub-identities mitigate identity-linkage attacks, while layered encryption enables selective, stepwise decryption of sensitive information (e.g., delivery addresses), ensuring participants access only the minimal information necessary for their tasks. In addition, zero-knowledge proof-based verification guarantees that the validation of derived sub-identities can be performed without sharing any plaintext attributes or identifying factors. We applied the framework to logistics, where sub-identities anonymize participants and layered encryption allows for delivery addresses to be decrypted progressively along the logistics chain, with only the final courier authorized to access complete information. During the parcel receipt process, users can complete verification using derived sub-identities and zero-knowledge proofs alone, without disclosing any real personal information or attributes that could be linked back to their identity. Trusted Execution Environments (TEEs) ensure the authenticity of decryption requests, while blockchain provides immutable audit trails. A demonstration system was implemented, formally verified using Scyther, and performance-tested across multiple platforms, including resource-constrained environments, showing high efficiency and strong practical potential. The core paradigms of identity unlinkability and process-driven data disclosure are generalizable and applicable to multi-party scenarios involving sensitive data flows. Full article
Show Figures

Figure 1

23 pages, 886 KB  
Article
A Distributed Operational Method for Convex Hull Pricing Based on the Alternating Direction Method of Multipliers with Dantzig–Wolfe and Benders Decomposition
by Linfeng Yang, Xinhan Lin, Shifei Chen, Zhiding Wu and Haiyan Zheng
Appl. Sci. 2026, 16(2), 1097; https://doi.org/10.3390/app16021097 - 21 Jan 2026
Viewed by 74
Abstract
Due to the non-convex characteristic of the power system, it may be difficult for power generators to recover costs by following the system operators. Therefore, independent system operators have introduced discriminatory supplementary payments as incentive measures. In this context, convex hull pricing serves [...] Read more.
Due to the non-convex characteristic of the power system, it may be difficult for power generators to recover costs by following the system operators. Therefore, independent system operators have introduced discriminatory supplementary payments as incentive measures. In this context, convex hull pricing serves as an integrated solution, capable of markedly reducing such additional payouts. For the convex hull pricing problem, we propose a distributed solution method. This algorithm is based on Dantzig–Wolfe decomposition and Benders decomposition. According to the characteristics of different units, the model is decomposed into a master problem and a group of independent subproblems, and the consensus ADMM method is used to solve the master problem. The convex hull pricing problem can still be solved using this method when the data is stored separately or when the independent agents responsible for each unit wish to protect their information privacy. While ensuring the confidentiality of each unit’s information, high-quality solutions can still be obtained with high efficiency. By comparing the numerical results with those of the other three convex hull pricing algorithms, it is evident that our algorithm can obtain high-quality solutions. Full article
Show Figures

Figure 1

Back to TopTop