A Systematic Survey On Security in Anonymity Networks: Vulnerabilities, Attacks, Defenses, and Formalization

D Chao, D Xu, F Gao, C Zhang… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
The importance of safeguarding individuals' privacy rights in online activities is unmistakable
in today's anonymity networks. Since the introduction of Mixnet by Chaum, numerous …

Post quantum fuzzy stealth signatures and applications

S Pu, SAK Thyagarajan, N Döttling… - Proceedings of the 2023 …, 2023 - dl.acm.org
Private payments in blockchain-based cryptocurrencies have been a topic of research, both
academic and industrial, ever since the advent of Bitcoin. Stealth address payments were …

AQRS: Anti-quantum ring signature scheme for secure epidemic control with blockchain

X Chen, S Xu, Y Cao, Y He, K **ao - Computer Networks, 2023 - Elsevier
Abstract Epidemics, such as Corona Virus Disease 2019 (COVID-19), have serious
consequences globally, of which the most effective way to control the infection is contact …

The exact security of BIP32 wallets

P Das, A Erwig, S Faust, J Loss, S Riahi - Proceedings of the 2021 ACM …, 2021 - dl.acm.org
In many cryptocurrencies, the problem of key management has become one of the most
fundamental security challenges. Typically, keys are kept in designated schemes called …

Deterministic wallets for adaptor signatures

A Erwig, S Riahi - European Symposium on Research in Computer …, 2022 - Springer
Adaptor signatures are a new cryptographic primitive that binds the authentication of a
message to the revelation of a secret value. In recent years, this primitive has gained …

Post-quantum key-blinding for authentication in anonymity networks

E Eaton, D Stebila, R Stracovsky - … , Bogotá, Colombia, October 6–8, 2021 …, 2021 - Springer
Anonymity networks, such as the Tor network, are highly decentralized and make heavy use
of ephemeral identities. Both of these characteristics run in direct opposition to a traditional …

Secure hierarchical deterministic wallet supporting stealth address

X Yin, Z Liu, G Yang, G Chen, H Zhu - European Symposium on Research …, 2022 - Springer
Over the past decade, cryptocurrency has been undergoing a rapid development. Digital
wallet, as the tool to store and manage the cryptographic keys, is the primary entrance for …

SoK: Signatures With Randomizable Keys

S Celi, S Griffy, L Hanzlik, OP Kempner… - Cryptology ePrint …, 2023 - eprint.iacr.org
Digital signature schemes with specific properties have recently seen various real-world
applications with a strong emphasis on privacy-enhancing technologies. They have been …

Performance Analysis and Evaluation of Post Quantum Secure Blockchain Federated Learning

D Gurung, SR Pokhrel, G Li - arxiv preprint arxiv:2306.14772, 2023 - arxiv.org
Post-quantum security is critical in the quantum era. Quantum computers, along with
quantum algorithms, make the standard cryptography based on RSA or ECDSA over FL or …

Efficient post-quantum secure deterministic threshold wallets from isogenies

P Das, A Erwig, M Meyer, P Struck - Proceedings of the 19th ACM Asia …, 2024 - dl.acm.org
Cryptocurrency networks crucially rely on digital signature schemes, which are used as an
authentication mechanism for transactions. Unfortunately, most major cryptocurrencies …