Research on Wallet Protection Against Currency Failure in Blockchain
The protection of blockchain wallet is the basis of secure transaction in blockchain. Private key is the core of wallet security. The private key cannot be protected based on a reliable third party.
ZHOU Jian, SUN Liyan, FU Ming
doaj +1 more source
Anonymous Data Sharing and Access Control Based on Blockchain and Attribute-Based Cryptography [PDF]
Information security and privacy protection are critical requirements in the era of big data. Identity-based cryptography is a type of public-key cryptography that solves the main management problem of the traditional public key infrastructure.However ...
Jingyi WANG, Baixiang LIU, Ning FANG, Lingqi PENG
doaj +1 more source
Fully distributed certificate authority based on polynomial over elliptic curve for MANET [PDF]
A mobile ad hoc network (MANET) is a wireless communication network, which does not rely on any centralized management or a pre-existing infrastructure. Various certificate authorities (CAs) distributed over the network, each with a periodically updated ...
Ahmad Alomari
doaj +1 more source
Geometric realization of electronic elections based on threshold secret sharing
Introduction. One of the tasks arising in cryptography is to ensure a safe and fair conduct of e-voting. This paper details the algorithm of electronic elections particularly that part which deals with the cryptographic security.
A. V. Mazurenko, V. A. Stukopin
doaj +1 more source
High Key Rate Quantum Conference Key Agreement With Unconditional Security
Quantum cryptography is a major ingredient of the future quantum internet that promises various secure communication tasks. Quantum conference key agreement (CKA) is an important cryptographic primitive of quantum cryptography, which provides the ...
Xiao-Yu Cao +5 more
doaj +1 more source
Superlinear threshold detectors in quantum cryptography [PDF]
Rewritten for clearity. Included a discussion on detector dark counts, a discussion on how to tackle this type of loopholes, and updated references.
Lydersen, L. +7 more
openaire +3 more sources
Trojan-horse attacks threaten the security of practical quantum cryptography [PDF]
A quantum key distribution system may be probed by an eavesdropper Eve by sending in bright light from the quantum channel and analyzing the back-reflections. We propose and experimentally demonstrate a setup for mounting such a Trojan-horse attack.
Anisimova, Elena +5 more
core +3 more sources
A Novel XOR-Based Threshold Visual Cryptography with Adjustable Pixel Expansion
A ( k , n ) visual cryptography (VC) scheme encodes a secret image into n shadows that are printed on transparencies distributed among a group of n participants secretly, and reveal the secret image by stacking no less than k of them.
Yusheng Guo +3 more
doaj +1 more source
Key Escrow Protocol Based on a Tripartite Authenticated Key Agreement and Threshold Cryptography
While instant messaging systems bring convenience to people's lives and work, they also make it easier for malicious users to discuss and plot illegal activities.
Zhen Wang +3 more
doaj +1 more source
Threshold Cryptography Based on Asmuth-Bloom Secret Sharing [PDF]
In this paper, we investigate how threshold cryptography can be conducted with the Asmuth-Bloom secret sharing scheme and present two novel function sharing schemes, one for the RSA signature and the other for the ElGamal decryption functions, based on the Asmuth-Bloom scheme.
Kaya, Kamer +2 more
openaire +3 more sources

