Redactable blockchain–or–rewriting history in bitcoin and friends
We put forward a new framework that makes it possible to re-write or compress the content
of any number of blocks in decentralized services exploiting the blockchain technology. As …
of any number of blocks in decentralized services exploiting the blockchain technology. As …
Efficient chameleon hash functions in the enhanced collision resistant model
Chameleon hash functions are collision resistant when only the hashing keys of the
functions are known. In particular, without the knowledge of the secret information, the …
functions are known. In particular, without the knowledge of the secret information, the …
Prbfpt: A practical redactable blockchain framework with a public trapdoor
While blockchain is known to support open and transparent data exchange, partly due to its
nontamperability property, it can also be (ab) used to facilitate the spreading of fake and …
nontamperability property, it can also be (ab) used to facilitate the spreading of fake and …
Identity-based chameleon hashing and signatures without key exposure
The notion of chameleon hash function without key exposure plays an important role in
designing secure chameleon signatures. However, all of the existing key-exposure free …
designing secure chameleon signatures. However, all of the existing key-exposure free …
The realm of the pairings
Bilinear maps, or pairings, initially proposed in a cryptologic context for cryptanalytic
purposes, proved afterward to be an amazingly flexible and useful tool for the construction of …
purposes, proved afterward to be an amazingly flexible and useful tool for the construction of …
Fine-Grained Redactable Blockchain Using Trapdoor-Hash
G Zhou, X Ding, H Han, A Zhu - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
The blockchain's immutability permits widespread application in untrusted contexts, such as
digital currency, the Internet of Things, and anti-counterfeiting. This functionality, however …
digital currency, the Internet of Things, and anti-counterfeiting. This functionality, however …
Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks
As a promising application scenario of wireless technologies, roaming communication
initiates the demand for secure and efficient handoff authentication schemes. However, it …
initiates the demand for secure and efficient handoff authentication schemes. However, it …
[HTML][HTML] Sanitizable signature scheme with privacy protection for electronic medical data sharing
Electronic medicine has received more and more attention because of its ability to provide
more efficient and better medical services. However, the characteristics of electronic medical …
more efficient and better medical services. However, the characteristics of electronic medical …
Communication-efficient verifiable data streaming protocol in the multi-user setting
Verifiable data streaming (VDS) protocols enable end users with limited storage space to
continuously stream data items to an untrusted cloud server, while preserving the capacity of …
continuously stream data items to an untrusted cloud server, while preserving the capacity of …
Efficient identity-based chameleon hash for mobile devices
C Li, Q Shen, Z **e, J Dong, Y Fang… - ICASSP 2022-2022 …, 2022 - ieeexplore.ieee.org
Online/offline identity-based signature (OO-IBS) is an adequate cryptographic tool to provide
the message authentication and integrity in mobile devices, since it lightens the …
the message authentication and integrity in mobile devices, since it lightens the …