A Generic Security Proof for Quantum Key Distribution
Quantum key distribution allows two parties, traditionally known as Alice and Bob, to establish a secure random cryptographic key if, firstly, they have access to a quantum communication channel, and secondly, they can exchange classical public messages ...
Christandl, Matthias +2 more
core
Key Substitution in the Symbolic Analysis of Cryptographic Protocols (extended version) [PDF]
Key substitution vulnerable signature schemes are signature schemes that permit an intruder, given a public verification key and a signed message, to compute a pair of signature and verification keys such that the message appears to be signed with the ...
Chevalier, Yannick, Kourjieh, Mounira
core +2 more sources
An Economic Analysis of Difficulty Adjustment Algorithms in Proof‐of‐Work Blockchain Systems
ABSTRACT We study the stability of cryptocurrency systems through difficulty adjustment. Bitcoin's difficulty adjustment algorithm (DAA) exhibits instability when the reward elasticity of the hash rate is high, implying that a sharp price reduction could disrupt the current Bitcoin system.
Shunya Noda +2 more
wiley +1 more source
Resource Fairness and Composability of Cryptographic Protocols [PDF]
Juan A. Garay +3 more
openalex +1 more source
Digital Identity Wallets: A Guide to the EU’s New Identity Model
ABSTRACT By 2026, the European Union will introduce digital identity wallets to its citizens, residents, and organisations. These wallets will have far‐reaching implications for how public and private sector organisations interact with their users—some evident, others less.
Andre Kudra +5 more
wiley +1 more source
Verifying privacy by little interaction and no process equivalence [PDF]
While machine-assisted verification of classical security goals such as confidentiality and authentication is well-established, it is less mature for recent ones. Electronic voting protocols claim properties such as voter privacy.
Bella, Giampaolo +1 more
core
Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography [PDF]
Younsung Choi +5 more
openalex +1 more source
Coalition Formation for Sustainable Blockchain Governance: Insights From the Hedera Case
ABSTRACT Sustainable governance is essential for blockchain networks to achieve widespread adoption and deliver long‐term business value. Prior blockchain initiatives indicate that inadequate governance structures often lead to limited adoption or eventual project failure, underscoring the importance of decentralised governance for building resilient ...
Christophe Viguerie, Horst Treiblmaier
wiley +1 more source
Multi-language oriented automatic realization method for cryptographic protocols
A multi-objective-language-oriented automatic code generation scheme for security protocols was put forward.First,based on XML,a description method for security protocols was designed.Second,a graphic user interface(GUI)was developed,through which the ...
Xing-hua LI +3 more
doaj +2 more sources
A Real-Time Performance Analysis Model for Cryptographic Protocols [PDF]
Several encryption algorithms exist today for securing data in storage and transmission over network systems. The choice of encryption algorithms must weigh performance requirements against the call for protection of sensitive data.
Amos Olagunju, Jake Soenneker
doaj

