A Systematic Survey On Security in Anonymity Networks: Vulnerabilities, Attacks, Defenses, and Formalization
D Chao, D Xu, F Gao, C Zhang… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
The importance of safeguarding individuals' privacy rights in online activities is unmistakable
in today's anonymity networks. Since the introduction of Mixnet by Chaum, numerous …
in today's anonymity networks. Since the introduction of Mixnet by Chaum, numerous …
Post quantum fuzzy stealth signatures and applications
S Pu, SAK Thyagarajan, N Döttling… - Proceedings of the 2023 …, 2023 - dl.acm.org
Private payments in blockchain-based cryptocurrencies have been a topic of research, both
academic and industrial, ever since the advent of Bitcoin. Stealth address payments were …
academic and industrial, ever since the advent of Bitcoin. Stealth address payments were …
AQRS: Anti-quantum ring signature scheme for secure epidemic control with blockchain
Abstract Epidemics, such as Corona Virus Disease 2019 (COVID-19), have serious
consequences globally, of which the most effective way to control the infection is contact …
consequences globally, of which the most effective way to control the infection is contact …
The exact security of BIP32 wallets
In many cryptocurrencies, the problem of key management has become one of the most
fundamental security challenges. Typically, keys are kept in designated schemes called …
fundamental security challenges. Typically, keys are kept in designated schemes called …
A Comprehensive Review of Exploring the Dynamic Evolution of Digital Wallets and Currencies in the Face of Challenges, Innovation, and the Future Landscape from …
AA Mohammed, AMS Rahma… - Journal of Electrical …, 2024 - search.proquest.com
The advent of digital payments in the last few years had not only led to the proliferation of
electronic wallets or e-wallets where users deposit their funds and then use them to make …
electronic wallets or e-wallets where users deposit their funds and then use them to make …
Deterministic wallets for adaptor signatures
Adaptor signatures are a new cryptographic primitive that binds the authentication of a
message to the revelation of a secret value. In recent years, this primitive has gained …
message to the revelation of a secret value. In recent years, this primitive has gained …
Post-quantum key-blinding for authentication in anonymity networks
Anonymity networks, such as the Tor network, are highly decentralized and make heavy use
of ephemeral identities. Both of these characteristics run in direct opposition to a traditional …
of ephemeral identities. Both of these characteristics run in direct opposition to a traditional …
Secure hierarchical deterministic wallet supporting stealth address
Over the past decade, cryptocurrency has been undergoing a rapid development. Digital
wallet, as the tool to store and manage the cryptographic keys, is the primary entrance for …
wallet, as the tool to store and manage the cryptographic keys, is the primary entrance for …
SoK: Signatures With Randomizable Keys
Digital signature schemes with specific properties have recently seen various real-world
applications with a strong emphasis on privacy-enhancing technologies. They have been …
applications with a strong emphasis on privacy-enhancing technologies. They have been …
Performance Analysis and Evaluation of Post Quantum Secure Blockchain Federated Learning
D Gurung, SR Pokhrel, G Li - arXiv preprint arXiv:2306.14772, 2023 - arxiv.org
Post-quantum security is critical in the quantum era. Quantum computers, along with
quantum algorithms, make the standard cryptography based on RSA or ECDSA over FL or …
quantum algorithms, make the standard cryptography based on RSA or ECDSA over FL or …