You are currently viewing a new version of our website. To view the old version click .

60,722 Results Found

  • Article
  • Open Access
27 Citations
8,440 Views
12 Pages

Background: Verified and authentic information about coronavirus disease (COVID-19) on social networking sites (SNS) could help people make appropriate decisions to protect themselves. However, little is known about what factors influence people’s sh...

  • Article
  • Open Access
11 Citations
8,438 Views
16 Pages

4 June 2018

Carbon credit projects generate carbon credits by abating greenhouse gas emissions. Carbon credits can then be traded on carbon markets or immobilized in order to compensate for caused emissions. The Clean Development Mechanism (CDM) and Verified Car...

  • Article
  • Open Access
1 Citations
752 Views
35 Pages

Verified Language Processing with Hybrid Explainability

  • Oliver Robert Fox,
  • Giacomo Bergami and
  • Graham Morgan

31 August 2025

The volume and diversity of digital information have led to a growing reliance on Machine Learning (ML) techniques, such as Natural Language Processing (NLP), for interpreting and accessing appropriate data. While vector and graph embeddings represen...

  • Article
  • Open Access
36 Citations
3,632 Views
17 Pages

12 September 2018

Verified emissions announcements are the most influential events in the European Union emissions trading scheme (EU ETS); they reveal demand information and have a significant impact on the carbon market. The extant literature tends to focus on exami...

  • Article
  • Open Access
12 Citations
3,811 Views
19 Pages

Development of a Pre-Verified EPD Tool with Process Simulation Capabilities for the Aggregates Industry

  • Panagiota Papadopoulou,
  • Diego Peñaloza,
  • Gauti Asbjörnsson,
  • Erik Hulthén and
  • Magnus Evertsson

24 August 2021

This paper has two aims: to describe the current status and challenges of aggregates producers regarding the analysis and communication of environmental information of their products and to present a layout of a pre-verified tool with simulation capa...

  • Article
  • Open Access
21 Citations
5,855 Views
25 Pages

23 October 2022

As of 2022, non-fungible tokens, or NFTs, the smart contract powered tokens that represent ownership in a specific digital asset, have become a popular investment vehicle. In 2021, NFT trading reached USD 17.6 billion and entered mainstream media wit...

  • Article
  • Open Access
13 Citations
5,282 Views
22 Pages

Often clients (e.g., sensors, organizations) need to outsource joint computations that are based on some joint inputs to external untrusted servers. These computations often rely on the aggregation of data collected from multiple clients, while the c...

  • Article
  • Open Access
7 Citations
4,502 Views
17 Pages

Verifiable Delay Function and Its Blockchain-Related Application: A Survey

  • Qiang Wu,
  • Liang Xi,
  • Shiren Wang,
  • Shan Ji,
  • Shenqing Wang and
  • Yongjun Ren

4 October 2022

The concept of verifiable delay functions has received attention from researchers since it was first proposed in 2018. The applications of verifiable delay are also widespread in blockchain research, such as: computational timestamping, public random...

  • Article
  • Open Access
8 Citations
5,486 Views
20 Pages

Statically Aggregate Verifiable Random Functions and Application to E-Lottery

  • Bei Liang,
  • Gustavo Banegas and
  • Aikaterini Mitrokotsa

Cohen, Goldwasser, and Vaikuntanathan (TCC’15) introduced the concept of aggregate pseudo-random functions (PRFs), which allow efficiently computing the aggregate of PRF values over exponential-sized sets. In this paper, we explore the aggregat...

  • Article
  • Open Access
4 Citations
1,886 Views
16 Pages

12 January 2024

A transitive signature scheme enables anyone to obtain the signature on edge (i,k) by combining the signatures on edges (i,j) and (j,k), but it suffers from signature theft and signature abuse. The existing work has solved these problems using a univ...

  • Article
  • Open Access
1,315 Views
31 Pages

27 February 2025

As an important branch of machine learning, federated learning still suffers from statistical heterogeneity. Therefore, personalized federated learning (PFL) is proposed to deal with this obstacle. However, the privacy of local and global gradients i...

  • Article
  • Open Access
5 Citations
2,577 Views
20 Pages

Achieving Verifiable Decision Tree Prediction on Hybrid Blockchains

  • Moxuan Fu,
  • Chuan Zhang,
  • Chenfei Hu,
  • Tong Wu,
  • Jinyang Dong and
  • Liehuang Zhu

13 July 2023

Machine learning has become increasingly popular in academic and industrial communities and has been widely implemented in various online applications due to its powerful ability to analyze and use data. Among all the machine learning models, decisio...

  • Article
  • Open Access
3 Citations
3,995 Views
25 Pages

4 September 2017

Incentive mechanisms of crowdsensing have recently been intensively explored. Most of these mechanisms mainly focus on the standard economical goals like truthfulness and utility maximization. However, enormous privacy and security challenges need to...

  • Article
  • Open Access
1,135 Views
20 Pages

22 June 2025

A preservationist Christian sexual ethic affirms heterosexuality as the only normal and natural expression of wholeness in human intimacy, relationships, and lifestyle. However, revisionist critics would maintain that the central problem of the prese...

  • Article
  • Open Access
11 Citations
2,776 Views
12 Pages

A Hash-Based Quantum-Resistant Designated Verifier Signature Scheme

  • P. Thanalakshmi,
  • R. Anitha,
  • N. Anbazhagan,
  • Chulho Park,
  • Gyanendra Prasad Joshi and
  • Changho Seo

11 May 2022

Digital signatures are unsuitable for specific applications that are sensitive on a personal or commercial level because they are universally verifiable. Jakobsson et al. proposed the Designated Verifier Signature (DVS) system, which only allows the...

  • Article
  • Open Access
18 Citations
3,480 Views
27 Pages

25 March 2023

Privacy and verifiability are crucial security requirements in e-voting systems and combining them is considered to be a challenge given that they seem to be contradictory. On one hand, privacy means that cast votes cannot be traced to the correspond...

  • Article
  • Open Access
3 Citations
2,781 Views
18 Pages

Strong Designated Verifier Signature Scheme with Undeniability and Strong Unforgeability in the Standard Model

  • Xiaodong Yang,
  • Guilan Chen,
  • Ting Li,
  • Rui Liu,
  • Meiding Wang and
  • Caifen Wang

19 May 2019

Strong designated verifier signature can provide an efficient way to protect the identity privacy of the signer and the integrity of the data transmitted over the public channel. These characteristics make it very useful in outsourcing computing, ele...

  • Article
  • Open Access
1 Citations
1,424 Views
16 Pages

Verifiable Additive Homomorphic Secret Sharing with Dynamic Aggregation Support

  • Sinan Wang,
  • Changgen Peng,
  • Xinxin Deng,
  • Zongfeng Peng and
  • Qihong Chen

(n,m,t)-Homomorphic Secret Sharing (HSS) allows n clients to share data secretly to m servers, which compute a function f homomorphically on the received secretly shared data while restricting the input data acquired by a collection of t servers to p...

  • Article
  • Open Access
2,130 Views
20 Pages

25 May 2022

With publicly verifiable computation (PVC) development, users with limited resources prefer to outsource computing tasks to cloud servers. However, existing PVC schemes are mainly proposed for cloud computing scenarios, which brings bandwidth consump...

  • Article
  • Open Access
11 Citations
4,509 Views
14 Pages

Analysis of an ABE Scheme with Verifiable Outsourced Decryption

  • Yongjian Liao,
  • Yichuan He,
  • Fagen Li,
  • Shaoquan Jiang and
  • Shijie Zhou

10 January 2018

Attribute-based encryption (ABE) is a popular cryptographic technology to protect the security of users’ data in cloud computing. In order to reduce its decryption cost, outsourcing the decryption of ciphertexts is an available method, which enables...

  • Article
  • Open Access
24 Citations
12,335 Views
15 Pages

A Verifiable Fully Homomorphic Encryption Scheme for Cloud Computing Security

  • Ahmed EL-YAHYAOUI and
  • Mohamed Dafir ECH-CHERIF EL KETTANI

Performing smart computations in a context of cloud computing and big data is highly appreciated today. It allows customers to fully benefit from cloud computing capacities (such as processing or storage) without losing confidentiality of sensitive d...

  • Article
  • Open Access
4 Citations
6,890 Views
18 Pages

We propose a new authentication algorithm for small internet of things (IoT) devices without key distribution and secure servers. Encrypted private data are stored on the cloud server in the registration step and compared with incoming encrypted data...

  • Article
  • Open Access
26 Citations
2,737 Views
17 Pages

11 January 2022

In this paper, we present a verifiable arbitrated quantum signature scheme based on controlled quantum teleportation. The five-qubit entangled state functions as a quantum channel. The proposed scheme uses mutually unbiased bases particles as decoy p...

  • Article
  • Open Access
2 Citations
2,385 Views
25 Pages

20 September 2023

With the rapid development of Internet of Things technology and cloud computing technology, all industries need to outsource massive data to third-party clouds for storage in order to reduce storage and computing costs. Verifiable and dynamic searcha...

  • Article
  • Open Access
5 Citations
2,723 Views
17 Pages

Attribute-Based Verifiable Conditional Proxy Re-Encryption Scheme

  • Yongli Tang,
  • Minglu Jin,
  • Hui Meng,
  • Li Yang and
  • Chengfu Zheng

19 May 2023

There are mostly semi-honest agents in cloud computing, so agents may perform unreliable calculations during the actual execution process. In this paper, an attribute-based verifiable conditional proxy re-encryption (AB-VCPRE) scheme using a homomorp...

  • Article
  • Open Access
2 Citations
2,417 Views
19 Pages

21 April 2023

With the prevalence of cloud computing, the outsourcing of computation has gained significant attention. Clients with limited computing power often outsource complex computing tasks to the cloud to save on computing resources and costs. In outsourcin...

  • Article
  • Open Access
1 Citations
1,994 Views
24 Pages

With the rapid development of cloud storage and cloud computing technology, users can upload data to the cloud and share it with other users. However, the integrity and the privacy of data files at the cloud service provider suffer from challenges. I...

  • Article
  • Open Access
4 Citations
2,797 Views
15 Pages

31 October 2022

Before the transaction data in the blockchain is successfully linked, its signature must be publicly verified by a large number of nodes in the blockchain, which is also one of the ways to leak transaction information. To alleviate the contradiction...

  • Article
  • Open Access
4 Citations
2,844 Views
19 Pages

Communication-Efficient and Privacy-Preserving Verifiable Aggregation for Federated Learning

  • Kaixin Peng,
  • Xiaoying Shen,
  • Le Gao,
  • Baocang Wang and
  • Yichao Lu

27 July 2023

Federated learning is a distributed machine learning framework, which allows users to save data locally for training without sharing data. Users send the trained local model to the server for aggregation. However, untrusted servers may infer users&rs...

  • Article
  • Open Access
1 Citations
2,150 Views
16 Pages

23 September 2024

The online services provided by the Service Provider (SP) have brought significant convenience to people’s lives. Nowadays, people have grown accustomed to obtaining diverse services via the Internet. However, some SP utilize or even tamper wit...

  • Article
  • Open Access
8 Citations
13,610 Views
29 Pages

Many e-voting techniques have been proposed but not widely used in reality. One of the problems associated with most existing e-voting techniques is the lack of transparency, leading to a failure to deliver voter assurance. In this work, we p verifia...

  • Article
  • Open Access
78 Citations
10,187 Views
15 Pages

A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing

  • Kai Fan,
  • Junxiong Wang,
  • Xin Wang,
  • Hui Li and
  • Yintang Yang

24 July 2017

With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottl...

  • Article
  • Open Access
2 Citations
4,879 Views
26 Pages

A Verified Implementation of the DPLL Algorithm in Dafny

  • Cezar-Constantin Andrici and
  • Ștefan Ciobâcă

28 June 2022

We present a DPLL SAT solver, which we call TrueSAT, developed in the verification-enabled programming language Dafny. We have fully verified the functional correctness of our solver by constructing machine-checked proofs of its soundness, completene...

  • Article
  • Open Access
1 Citations
1,138 Views
19 Pages

22 October 2024

To address the deficiencies in privacy-preserving expressive query and verification mechanisms in outsourced key-value stores, we propose EKV-VBQ, a scheme designed to ensure verifiable Boolean queries over encrypted key-value data. We have integrate...

  • Article
  • Open Access
429 Views
17 Pages

Constrained pseudorandom functions (CPRFs) are fundamental cryptographic primitives used in broadcast encryption and attributed-based encryption. Constrained verifiable random functions (CVRFs) extend CPRFs by incorporating verifiability. A constrain...

  • Article
  • Open Access
10 Citations
3,293 Views
22 Pages

A Strong Designated Verifier Proxy Re-Signature Scheme for IoT Environments

  • Xiao-Dong Yang,
  • Li-Kun Xiao,
  • Chun-Lin Chen and
  • Cai-Fen Wang

2 November 2018

With the rapid popularization of the Internet of Things (IoT) in our daily lives, the communication security and identity privacy of IoT devices must be ensured. However, traditional authentication mechanisms utilized in IoT cannot completely ensure...

  • Article
  • Open Access
1 Citations
2,583 Views
13 Pages

15 February 2023

A new class of cryptosystems called verifiable encryption (VE) that facilitates the verification of two plaintexts without decryption was proposed in our previous paper. The main contributions of our previous study include the following. (1) Certain...

  • Article
  • Open Access
1 Citations
515 Views
21 Pages

15 July 2025

Provable data possession (PDP) is a technique that enables the verification of data integrity in cloud storage without the need to download the data. PDP schemes are generally categorized into public and private verification. Public verification allo...

  • Article
  • Open Access
12 Citations
4,991 Views
35 Pages

New DoS Defense Method Based on Strong Designated Verifier Signatures

  • Marcone Pereira De Almeida,
  • Rafael Timóteo De Sousa Júnior,
  • Luis Javier García Villalba and
  • Tai-Hoon Kim

26 August 2018

We present a novel technique for source authentication of a packet stream in a network, which intends to give guarantees that a specific network flow really comes from a claimed origin. This mechanism, named packet level authentication (PLA), can be...

  • Article
  • Open Access
7 Citations
2,866 Views
17 Pages

24 March 2023

Public key encryption with keyword search (PEKS) allows users to perform keyword searches of ciphertext on untrusted cloud storage servers, protecting data privacy while sharing data. However, it faces several security problems in practical applicati...

  • Article
  • Open Access
5 Citations
3,572 Views
17 Pages

While transferring data to cloud servers frees users from having to manage it, it eventually raises new problems, such as data privacy. The concept of searchable encryption has drawn more and more focus in research as a means of resolving the tension...

  • Article
  • Open Access
13 Citations
4,239 Views
15 Pages

Advancing Federated Learning through Verifiable Computations and Homomorphic Encryption

  • Bingxue Zhang,
  • Guangguang Lu,
  • Pengpeng Qiu,
  • Xumin Gui and
  • Yang Shi

16 November 2023

Federated learning, as one of the three main technical routes for privacy computing, has been widely studied and applied in both academia and industry. However, malicious nodes may tamper with the algorithm execution process or submit false learning...

  • Article
  • Open Access
601 Views
39 Pages

Traceable ring signatures (TRSs) allow a signer to create a signature that maintains anonymity while enabling traceability if needed. It merges the characteristics of traditional ring signatures with the ability to trace signers, making it ideal for...

  • Article
  • Open Access
13 Citations
6,119 Views
49 Pages

This paper explores the concept of digital identity in the evolving landscape of Web 3.0, focusing on the development and implications of a novel authentication scheme using verifiable credentials. The background sets the stage by placing digital ide...

  • Article
  • Open Access
553 Views
22 Pages

19 June 2025

This paper proposes a multi-party verifiably collaborative system for encrypting the nonlinear and the non-stationary biomedical signals captured by biomedical sensors via the singular spectrum analysis (SSA)-based chaotic networks. In particular, th...

  • Article
  • Open Access
22 Citations
5,251 Views
16 Pages

Blockchain-Based Practical and Privacy-Preserving Federated Learning with Verifiable Fairness

  • Yitian Zhang,
  • Yuming Tang,
  • Zijian Zhang,
  • Meng Li,
  • Zhen Li,
  • Salabat Khan,
  • Huaping Chen and
  • Guoqiang Cheng

22 February 2023

Federated learning (FL) has been widely used in both academia and industry all around the world. FL has advantages from the perspective of data security, data diversity, real-time continual learning, hardware efficiency, etc. However, it brings new p...

  • Article
  • Open Access
2,089 Views
19 Pages

6 November 2023

Outsourcing computation has become increasingly popular due to its cost-effectiveness, enabling users with limited resources to conduct large-scale computations on potentially untrusted cloud platforms. In order to safeguard privacy, verifiable compu...

  • Article
  • Open Access
5 Citations
4,001 Views
21 Pages

Federated learning is a privacy-preserving machine learning framework where multiple data owners collaborate to train a global model under the orchestra of a central server. The local training results from trainers should be submitted to the central...

  • Article
  • Open Access
4 Citations
4,070 Views
28 Pages

An efficient member revocation mechanism is a desirable feature when group signature schemes are applied in practical scenarios. Revocation methods, such as verifier-local revocation (VLR), provide an efficient member revocation in applications of gr...

  • Article
  • Open Access
2,307 Views
19 Pages

25 November 2022

With the rapid development of science and technology, enterprises will provide their customers with cloud data storage services. These massive amounts of data bring huge management costs to enterprises. Therefore, enterprises choose to store their da...

of 1,215