Post-quantum blockchain security for the Internet of Things: Survey and research directions

H Gharavi, J Granjal, E Monteiro - … Communications Surveys & …, 2024 - ieeexplore.ieee.org
Blockchain is becoming increasingly popular in the business and academic communities
because it can provide security for a wide range of applications. Therefore, researchers …

A survey on exotic signatures for post-quantum blockchain: Challenges and research directions

M Buser, R Dowsley, M Esgin, C Gritti… - ACM Computing …, 2023 - dl.acm.org
Blockchain technology provides efficient and secure solutions to various online activities by
utilizing a wide range of cryptographic tools. In this article, we survey the existing literature …

[HTML][HTML] Industrial blockchain threshold signatures in federated learning for unified space-air-ground-sea model training

J Chen, Z Wang, G Srivastava, TA Alghamdi… - Journal of Industrial …, 2024 - Elsevier
The space-air-ground-sea three-dimensional (3D) network is a comprehensive
communication network system. This 3D network combines extensive coverage of satellite …

Post-quantum asynchronous deniable key exchange and the signal handshake

J Brendel, R Fiedler, F Günther, C Janson… - … Conference on Public …, 2022 - Springer
The key exchange protocol that establishes initial shared secrets in the handshake of the
Signal end-to-end encrypted messaging protocol has several important characteristics:(1) it …

An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable

K Hashimoto, S Katsumata, K Kwiatkowski, T Prest - Journal of Cryptology, 2022 - Springer
The Signal protocol is a secure instant messaging protocol that underlies the security of
numerous applications such as WhatsApp, Skype, Facebook Messenger among many …

Ring signatures for deniable AKEM: Gandalf's fellowship

P Gajland, J Janneck, E Kiltz - Annual International Cryptology Conference, 2024 - Springer
Ring signatures, a cryptographic primitive introduced by Rivest, Shamir and Tauman
(ASIACRYPT 2001), offer signer anonymity within dynamically formed user groups. Recent …

Anonymity-enhancing multi-hop locks for monero-enabled payment channel networks

X Wang, C Lin, X Huang, D He - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Payment Channel Networks (PCNs) are innovative second-layer scaling technologies that
aim to improve transaction rates, reduce on-chain storage costs, and enable efficient atomic …

BLOOM: bimodal lattice one-out-of-many proofs and applications

V Lyubashevsky, NK Nguyen - … Conference on the Theory and Application …, 2022 - Springer
We give a construction of an efficient one-out-of-many proof system, in which a prover shows
that he knows the pre-image for one element in a set, based on the hardness of lattice …

{K-Waay}: Fast and Deniable {Post-Quantum}{X3DH} without Ring Signatures

D Collins, L Huguenin-Dumittan, NK Nguyen… - 33rd USENIX Security …, 2024 - usenix.org
The Signal protocol and its X3DH key exchange core are regularly used by billions of
people in applications like WhatsApp but are unfortunately not quantum-secure. Thus …

Efficient linkable ring signatures: new framework and post-quantum instantiations

Y Xue, X Lu, MH Au, C Zhang - European Symposium on Research in …, 2024 - Springer
In this paper, we introduce a new framework for constructing linkable ring signatures (LRS).
Our framework is based purely on signatures of knowledge (SoK) which allows one to issue …