Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey on exotic signatures for post-quantum blockchain: Challenges and research directions
Blockchain technology provides efficient and secure solutions to various online activities by
utilizing a wide range of cryptographic tools. In this article, we survey the existing literature …
utilizing a wide range of cryptographic tools. In this article, we survey the existing literature …
Lattice-based SNARKs: publicly verifiable, preprocessing, and recursively composable
A succinct non-interactive argument of knowledge (SNARK) allows a prover to produce a
short proof that certifies the veracity of a certain NP-statement. In the last decade, a large …
short proof that certifies the veracity of a certain NP-statement. In the last decade, a large …
Two-Round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices
Although they have been studied for a long time, distributed signature protocols have
garnered renewed interest in recent years in view of novel applications to topics like …
garnered renewed interest in recent years in view of novel applications to topics like …
Generalized channels from limited blockchain scripts and adaptor signatures
Decentralized and permissionless ledgers offer an inherently low transaction rate, as a
result of their consensus protocol demanding the storage of each transaction on-chain. A …
result of their consensus protocol demanding the storage of each transaction on-chain. A …
MatRiCT+: More Efficient Post-Quantum Private Blockchain Payments
We introduce MatRiCT+, a practical private blockchain payment protocol based on “post-
quantum” lattice assumptions. MatRiCT+ builds on MatRiCT due to Esgin et al.(ACM …
quantum” lattice assumptions. MatRiCT+ builds on MatRiCT due to Esgin et al.(ACM …
Navigating the quantum computing threat landscape for blockchains: A comprehensive survey
Quantum computers pose a significant threat to blockchain technology's security, which
heavily relies on public-key cryptography and hash functions. The cryptographic algorithms …
heavily relies on public-key cryptography and hash functions. The cryptographic algorithms …
Two-party adaptor signatures from identification schemes
Adaptor signatures are a novel cryptographic primitive with important applications for
cryptocurrencies. They have been used to construct second layer solutions such as payment …
cryptocurrencies. They have been used to construct second layer solutions such as payment …
Lockable signatures for blockchains: Scriptless scripts for all signatures
SAK Thyagarajan, G Malavolta - 2021 IEEE symposium on …, 2021 - ieeexplore.ieee.org
Payment Channel Networks (PCNs) have given a huge boost to the scalability of blockchain-
based cryptocurrencies: Beyond improving the transaction rate, PCNs enabled cheap cross …
based cryptocurrencies: Beyond improving the transaction rate, PCNs enabled cheap cross …
Foundations of adaptor signatures
Adaptor signatures extend the functionality of regular signatures through the computation of
pre-signatures on messages for statements of NP relations. Pre-signatures are publicly …
pre-signatures on messages for statements of NP relations. Pre-signatures are publicly …
Stronger security and generic constructions for adaptor signatures
W Dai, T Okamoto, G Yamamoto - International Conference on Cryptology …, 2022 - Springer
Adaptor signatures have seen wide applications in layer-2 and peer-to-peer blockchain
applications such as atomic swaps and payment channels. We first identify two …
applications such as atomic swaps and payment channels. We first identify two …