Analysis of cryptocurrency transactions from a network perspective: An overview

J Wu, J Liu, Y Zhao, Z Zheng - Journal of Network and Computer …, 2021 - Elsevier
As one of the most important and famous applications of blockchain technology,
cryptocurrency has attracted extensive attention recently. Empowered by blockchain …

[KNYGA][B] Handbook of applied cryptography

AJ Menezes, PC Van Oorschot, SA Vanstone - 2018 - taylorfrancis.com
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an
important discipline that is not only the subject of an enormous amount of research, but …

An efficient system for non-transferable anonymous credentials with optional anonymity revocation

J Camenisch, A Lysyanskaya - International conference on the theory and …, 2001 - Springer
A credential system is a system in which users can obtain credentials from organizations
and demonstrate possession of these credentials. Such a system is anonymous when …

The ring of gyges: Investigating the future of criminal smart contracts

A Juels, A Kosba, E Shi - Proceedings of the 2016 ACM SIGSAC …, 2016 - dl.acm.org
Thanks to their anonymity (pseudonymity) and elimination of trusted intermediaries,
cryptocurrencies such as Bitcoin have created or stimulated growth in many businesses and …

Publicly verifiable secret sharing

M Stadler - International Conference on the Theory and …, 1996 - Springer
A secret sharing scheme allows to share a secret among sev-eral participants such that only
certain groups of them can recover it. Verifiable secret sharing has been proposed to …

Compact e-cash

J Camenisch, S Hohenberger… - … Conference on the Theory …, 2005 - Springer
This paper presents efficient off-line anonymous e-cash schemes where a user can
withdraw a wallet containing 2 ℓ coins each of which she can spend unlinkably. Our first …

Cryptovirology: Extortion-based security threats and countermeasures

A Young, M Yung - … 1996 IEEE Symposium on Security and …, 1996 - ieeexplore.ieee.org
Traditionally, cryptography and its applications are defensive in nature, and provide privacy,
authentication, and security to users. In this paper we present the idea of Cryptovirology …

Post-quantum era privacy protection for intelligent infrastructures

L Malina, P Dzurenda, S Ricci, J Hajny… - IEEE …, 2021 - ieeexplore.ieee.org
As we move into a new decade, the global world of Intelligent Infrastructure (II) services
integrated into the Internet of Things (IoT) are at the forefront of technological advancements …

An immunological approach to change detection: Algorithms, analysis and implications

P D'haeseleer, S Forrest… - Proceedings 1996 IEEE …, 1996 - ieeexplore.ieee.org
We present new results on a distributable change-detection method inspired by the natural
immune system. A weakness in the original algorithm was the exponential cost of generating …

Digital payment systems with passive anonymity-revoking trustees

J Camenisch, U Maurer… - Journal of Computer …, 1997 - journals.sagepub.com
Anonymity of the participants is an important requirement for some applications in electronic
commerce, in particular for payment systems. Because anonymity could be in conflict with …