This paper proposes a protocol for lottery and a protocol for auction on quantum Blockchain. Our protocol of lottery satisfies randomness, unpredictability, unforgeability, verifiability, decentralization and unconditional security. Our protocol of auction satisfies bid privacy, posterior privacy, bids' binding, decentralization and unconditional security. Except quantum Blockchain, the main technique involved in both protocols is quantum bit commitment.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC7762094 | PMC |
http://dx.doi.org/10.3390/e22121377 | DOI Listing |
IEEE Trans Priv
November 2024
Management Science and Information Systems Department, Rutgers University, Newark, NJ 07102-3122 USA.
Interest in supporting Federated Learning (FL) using blockchains has grown significantly in recent years. However, restricting access to the trained models only to actively participating nodes remains a challenge even today. To address this concern, we propose a methodology that incentivizes model parameter sharing in an FL setup under Local Differential Privacy (LDP).
View Article and Find Full Text PDFHeliyon
December 2024
School of Business Administration, Zhongnan University of Economics and Law, Wuhan, 430073, China.
Land use planning tools are essential for effective land management. However, existing research has not thoroughly explored the evolution and future potential of these tools. This study addresses this gap through comprehensive literature review and data collection, mapping the progression of land use planning tools from their inception to their future trajectories.
View Article and Find Full Text PDFFront Big Data
December 2024
School of Business, Amrita Vishwa Vidyapeetham, Amritapuri, Kollam, Kerala, India.
Introduction: The rapid escalation of cyber threats necessitates innovative strategies to enhance cybersecurity and privacy measures. Artificial Intelligence (AI) has emerged as a promising tool poised to enhance the effectiveness of cybersecurity strategies by offering advanced capabilities for intrusion detection, malware classification, and privacy preservation. However, this work addresses the significant lack of a comprehensive synthesis of AI's use in cybersecurity and privacy across the vast literature, aiming to identify existing gaps and guide further progress.
View Article and Find Full Text PDFSensors (Basel)
November 2024
Department of Computer Science and Software Engineering, Auckland University of Technology, Auckland 1010, New Zealand.
This survey delves into cross-layer energy-efficient solutions and cutting-edge security measures for Internet of Things (IoT) networks. The conventional security techniques are considered inadequate, leading to the suggestion of AI-powered intrusion detection systems and novel strategies such as blockchain integration. This research aims to promote the development of smart cities by enhancing sustainability, security, and efficiency in the industrial and agricultural sectors through the use of IoT, blockchain, AI, and new communication technologies like 5G.
View Article and Find Full Text PDFSci Rep
November 2024
Networked Systems Laboratory, Department of IT Convergence Engineering, Kumoh National Institute of Technology, Gumi, South Korea.
Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!