Cross-Chain Identity Authentication Method Based on Relay Chain
The cross-chain identity authentication method based on relay chains provides a promising solution to the issues brought by the centralized notary mechanism. Nonetheless, it continues to encounter numerous challenges regarding data privacy, security, and issues of heterogeneity. For example, there i...
Saved in:
Main Authors: | Qipeng Huang, Minsheng Tan, Wenlong Tian |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2025-01-01
|
Series: | Information |
Subjects: | |
Online Access: | https://www.mdpi.com/2078-2489/16/1/27 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Recent advances of privacy-preserving machine learning based on (Fully) Homomorphic Encryption
by: Hong Cheng
Published: (2025-01-01) -
Privacy-preserving attribute-based access control using homomorphic encryption
by: Malte Kerl, et al.
Published: (2025-01-01) -
An improved Fully Homomorphic Encryption model based on N-Primes
by: Mohammed Anwar Mohammed, et al.
Published: (2019-10-01) -
Multi-Smart Meter Data Encryption Scheme Basedon Distributed Differential Privacy
by: Renwu Yan, et al.
Published: (2024-03-01) -
Resolving Covid-19 with Blockchain and AI
by: Suyogita Singh, et al.
Published: (2024-06-01)