A Systematic Survey On Security in Anonymity Networks: Vulnerabilities, Attacks, Defenses, and Formalization
D Chao, D Xu, F Gao, C Zhang… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
The importance of safeguarding individuals' privacy rights in online activities is unmistakable
in today's anonymity networks. Since the introduction of Mixnet by Chaum, numerous …
in today's anonymity networks. Since the introduction of Mixnet by Chaum, numerous …
Post quantum fuzzy stealth signatures and applications
Private payments in blockchain-based cryptocurrencies have been a topic of research, both
academic and industrial, ever since the advent of Bitcoin. Stealth address payments were …
academic and industrial, ever since the advent of Bitcoin. Stealth address payments were …
AQRS: Anti-quantum ring signature scheme for secure epidemic control with blockchain
Abstract Epidemics, such as Corona Virus Disease 2019 (COVID-19), have serious
consequences globally, of which the most effective way to control the infection is contact …
consequences globally, of which the most effective way to control the infection is contact …
The exact security of BIP32 wallets
In many cryptocurrencies, the problem of key management has become one of the most
fundamental security challenges. Typically, keys are kept in designated schemes called …
fundamental security challenges. Typically, keys are kept in designated schemes called …
Deterministic wallets for adaptor signatures
Adaptor signatures are a new cryptographic primitive that binds the authentication of a
message to the revelation of a secret value. In recent years, this primitive has gained …
message to the revelation of a secret value. In recent years, this primitive has gained …
Post-quantum key-blinding for authentication in anonymity networks
Anonymity networks, such as the Tor network, are highly decentralized and make heavy use
of ephemeral identities. Both of these characteristics run in direct opposition to a traditional …
of ephemeral identities. Both of these characteristics run in direct opposition to a traditional …
Secure hierarchical deterministic wallet supporting stealth address
Over the past decade, cryptocurrency has been undergoing a rapid development. Digital
wallet, as the tool to store and manage the cryptographic keys, is the primary entrance for …
wallet, as the tool to store and manage the cryptographic keys, is the primary entrance for …
SoK: Signatures With Randomizable Keys
Digital signature schemes with specific properties have recently seen various real-world
applications with a strong emphasis on privacy-enhancing technologies. They have been …
applications with a strong emphasis on privacy-enhancing technologies. They have been …
Performance Analysis and Evaluation of Post Quantum Secure Blockchain Federated Learning
Post-quantum security is critical in the quantum era. Quantum computers, along with
quantum algorithms, make the standard cryptography based on RSA or ECDSA over FL or …
quantum algorithms, make the standard cryptography based on RSA or ECDSA over FL or …
Efficient post-quantum secure deterministic threshold wallets from isogenies
Cryptocurrency networks crucially rely on digital signature schemes, which are used as an
authentication mechanism for transactions. Unfortunately, most major cryptocurrencies …
authentication mechanism for transactions. Unfortunately, most major cryptocurrencies …