A Blockchain Network Admission Control Mechanism Using Anonymous Identity-Based Cryptography
Permissioned blockchains are increasingly used in areas like supply chain management, financial transactions, and medical data sharing, where ensuring data consistency and security is critical. However, these systems are vulnerable to threats such as DDoS attacks, forged transactions, and certificat...
Saved in:
Main Authors: | Haibao Zhang, Wenbao Jiang, Jin Ding |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2024-12-01
|
Series: | Applied Sciences |
Subjects: | |
Online Access: | https://www.mdpi.com/2076-3417/15/1/130 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Identity-based roaming protocol with anonymity for heterogeneous wireless networks
by: JIANG Qi1, et al.
Published: (2010-01-01) -
Fare non-repudiation protocol based on identity-based cryptography
by: LIU Hong-wei, et al.
Published: (2009-01-01) -
Conditions for anonymity in some generic public-key encryption constructions
by: TIAN Yuan, et al.
Published: (2009-01-01) -
Anonymous authentication scheme based on one-off public key in pervasive computing environments
by: Chang-yuan LUO, et al.
Published: (2012-02-01) -
Research on distributed identity authentication mechanism of IoT device based on blockchain
by: Chen TAN, et al.
Published: (2020-06-01)