Results 31 to 40 of about 1,334,459 (231)
Keeping Authorities "Honest or Bust" with Decentralized Witness Cosigning [PDF]
The secret keys of critical network authorities - such as time, name, certificate, and software update services - represent high-value targets for hackers, criminals, and spy agencies wishing to use these keys secretly to compromise other hosts.
Ford, Bryan +8 more
core +3 more sources
A Review on Blockchain Operations in Construction Management
This study investigates the important role that the blockchain plays to manage the information about who did what and when and hence provides a strong base for any legal potential conflicts.
Hasan Volkan Oral, Bassant Sayed
doaj +1 more source
JaxNet: Scalable Blockchain Network [PDF]
Today's world is organized based on merit and value. A single global currency that's decentralized is needed for a global economy. Bitcoin is a partial solution to this need, however it suffers from scalability problems which prevent it from being mass ...
Emelyanenko, Taras +3 more
core +1 more source
SPHINCS$^+$ post-quantum digital signature scheme with Streebog hash function
Many commonly used public key cryptosystems will become insecure once a scalable quantum computer is built. New cryptographic schemes that can guarantee protection against attacks with quantum computers, so-called post-quantum algorithms, have emerged in
Anufriev, M. N. +5 more
core +1 more source
Non-malleable codes for space-bounded tampering [PDF]
Non-malleable codes—introduced by Dziembowski, Pietrzak and Wichs at ICS 2010—are key-less coding schemes in which mauling attempts to an encoding of a given message, w.r.t.
A Faonio +30 more
core +2 more sources
Distributed Random Process for a Large-Scale Peer-to-Peer Lottery [PDF]
Most online lotteries today fail to ensure the verifiability of the random process and rely on a trusted third party. This issue has received little attention since the emergence of distributed protocols like Bitcoin that demonstrated the potential of ...
J Zhou +7 more
core +4 more sources
Verifiable multi-keyword search scheme based on improved Merkle-Tree authentication method
Aiming at the problem that the result verification method in the searchable encryption scheme was complicated,the search cost was high and the efficiency was low,it was difficult to meet the requirements of efficient verification and security of multi ...
Youliang TIAN, Qin LUO
doaj +2 more sources
In blockchain, ensuring integrity of data when updating distributed ledgers is a challenging and very fundamental process. Most of blockchain networks use Merkle tree to verify the authenticity of data received from other peers on the network.
M. A. Maalla, S. V. Bezzateev
doaj +1 more source
Authenticating Spatial Queries on Blockchain Systems
In many blockchain networks, light nodes (e.g. mobile clients) with few computational resources must rely on more powerful full nodes to retrieve transactions from the chain.
Matteo Loporchio +3 more
doaj +1 more source
Analysis of the Cryptographic Tools for Blockchain and Bitcoin
Blockchain is one of the most interesting emerging technologies nowadays, with applications ranging from cryptocurrencies to smart contracts. This paper presents a review of the cryptographic tools necessary to understand the fundamentals of this ...
Víctor Gayoso Martínez +2 more
doaj +1 more source

