A Systematic Survey On Security in Anonymity Networks: Vulnerabilities, Attacks, Defenses, and Formalization

D Chao, D Xu, F Gao, C Zhang… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
The importance of safeguarding individuals' privacy rights in online activities is unmistakable
in today's anonymity networks. Since the introduction of Mixnet by Chaum, numerous …

Post quantum fuzzy stealth signatures and applications

S Pu, SAK Thyagarajan, N Döttling… - Proceedings of the 2023 …, 2023 - dl.acm.org
Private payments in blockchain-based cryptocurrencies have been a topic of research, both
academic and industrial, ever since the advent of Bitcoin. Stealth address payments were …

AQRS: Anti-quantum ring signature scheme for secure epidemic control with blockchain

X Chen, S Xu, Y Cao, Y He, K Xiao - Computer Networks, 2023 - Elsevier
Abstract Epidemics, such as Corona Virus Disease 2019 (COVID-19), have serious
consequences globally, of which the most effective way to control the infection is contact …

The exact security of BIP32 wallets

P Das, A Erwig, S Faust, J Loss, S Riahi - Proceedings of the 2021 ACM …, 2021 - dl.acm.org
In many cryptocurrencies, the problem of key management has become one of the most
fundamental security challenges. Typically, keys are kept in designated schemes called …

A Comprehensive Review of Exploring the Dynamic Evolution of Digital Wallets and Currencies in the Face of Challenges, Innovation, and the Future Landscape from …

AA Mohammed, AMS Rahma… - Journal of Electrical …, 2024 - search.proquest.com
The advent of digital payments in the last few years had not only led to the proliferation of
electronic wallets or e-wallets where users deposit their funds and then use them to make …

Deterministic wallets for adaptor signatures

A Erwig, S Riahi - European Symposium on Research in Computer …, 2022 - Springer
Adaptor signatures are a new cryptographic primitive that binds the authentication of a
message to the revelation of a secret value. In recent years, this primitive has gained …

Post-quantum key-blinding for authentication in anonymity networks

E Eaton, D Stebila, R Stracovsky - … , Bogotá, Colombia, October 6–8, 2021 …, 2021 - Springer
Anonymity networks, such as the Tor network, are highly decentralized and make heavy use
of ephemeral identities. Both of these characteristics run in direct opposition to a traditional …

Secure hierarchical deterministic wallet supporting stealth address

X Yin, Z Liu, G Yang, G Chen, H Zhu - European Symposium on Research …, 2022 - Springer
Over the past decade, cryptocurrency has been undergoing a rapid development. Digital
wallet, as the tool to store and manage the cryptographic keys, is the primary entrance for …

SoK: Signatures With Randomizable Keys

S Celi, S Griffy, L Hanzlik, OP Kempner… - Cryptology ePrint …, 2023 - eprint.iacr.org
Digital signature schemes with specific properties have recently seen various real-world
applications with a strong emphasis on privacy-enhancing technologies. They have been …

Performance Analysis and Evaluation of Post Quantum Secure Blockchain Federated Learning

D Gurung, SR Pokhrel, G Li - arXiv preprint arXiv:2306.14772, 2023 - arxiv.org
Post-quantum security is critical in the quantum era. Quantum computers, along with
quantum algorithms, make the standard cryptography based on RSA or ECDSA over FL or …