Post-quantum blockchain security for the Internet of Things: Survey and research directions
Blockchain is becoming increasingly popular in the business and academic communities
because it can provide security for a wide range of applications. Therefore, researchers …
because it can provide security for a wide range of applications. Therefore, researchers …
A survey on exotic signatures for post-quantum blockchain: Challenges and research directions
Blockchain technology provides efficient and secure solutions to various online activities by
utilizing a wide range of cryptographic tools. In this article, we survey the existing literature …
utilizing a wide range of cryptographic tools. In this article, we survey the existing literature …
[HTML][HTML] Industrial blockchain threshold signatures in federated learning for unified space-air-ground-sea model training
The space-air-ground-sea three-dimensional (3D) network is a comprehensive
communication network system. This 3D network combines extensive coverage of satellite …
communication network system. This 3D network combines extensive coverage of satellite …
Post-quantum asynchronous deniable key exchange and the signal handshake
The key exchange protocol that establishes initial shared secrets in the handshake of the
Signal end-to-end encrypted messaging protocol has several important characteristics:(1) it …
Signal end-to-end encrypted messaging protocol has several important characteristics:(1) it …
An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable
The Signal protocol is a secure instant messaging protocol that underlies the security of
numerous applications such as WhatsApp, Skype, Facebook Messenger among many …
numerous applications such as WhatsApp, Skype, Facebook Messenger among many …
Ring signatures for deniable AKEM: Gandalf's fellowship
Ring signatures, a cryptographic primitive introduced by Rivest, Shamir and Tauman
(ASIACRYPT 2001), offer signer anonymity within dynamically formed user groups. Recent …
(ASIACRYPT 2001), offer signer anonymity within dynamically formed user groups. Recent …
Anonymity-enhancing multi-hop locks for monero-enabled payment channel networks
Payment Channel Networks (PCNs) are innovative second-layer scaling technologies that
aim to improve transaction rates, reduce on-chain storage costs, and enable efficient atomic …
aim to improve transaction rates, reduce on-chain storage costs, and enable efficient atomic …
BLOOM: bimodal lattice one-out-of-many proofs and applications
We give a construction of an efficient one-out-of-many proof system, in which a prover shows
that he knows the pre-image for one element in a set, based on the hardness of lattice …
that he knows the pre-image for one element in a set, based on the hardness of lattice …
{K-Waay}: Fast and Deniable {Post-Quantum}{X3DH} without Ring Signatures
The Signal protocol and its X3DH key exchange core are regularly used by billions of
people in applications like WhatsApp but are unfortunately not quantum-secure. Thus …
people in applications like WhatsApp but are unfortunately not quantum-secure. Thus …
Efficient linkable ring signatures: new framework and post-quantum instantiations
In this paper, we introduce a new framework for constructing linkable ring signatures (LRS).
Our framework is based purely on signatures of knowledge (SoK) which allows one to issue …
Our framework is based purely on signatures of knowledge (SoK) which allows one to issue …