© 2019 IEEE. Since the introduction of Bitcoin in 2008, cryptocurrency has been undergoing a quick and explosive development. At the same time, privacy protection, one of the key merits of cryptocurrency, has attracted much attention by the community. A deterministic wallet algorithm and a stealth address algorithm have been widely adopted in the community, due to their virtues on functionality and privacy protection, which come from a key derivation mechanism that an arbitrary number of derived keys can be generated from a master key. However, these algorithms suffer a vulnerability. In particular, when a minor fault happens (say, one derived key is compromised somehow), the damage is not limited to the leaked derived key only, instead, it...
An encryption method is presented with the novel property that publicly revealing an encryption key ...
We develop a three-level hierarchy of privacy notions for (un-forgeable) digital signature schemes. ...
Recently, blockchain technology has garnered support. However, an attenuating factor to its global a...
© Springer Nature Switzerland AG 2020. As a widely used privacy-preserving technique for cryptocurre...
First proposed in CryptoNote, a collection of popular privacy-centric cryptocurrencies have employed...
First proposed in CryptoNote, a collection of popular privacy-centric cryptocurrencies have employed...
[[abstract]]Recently, the notion of the key-insulated public- key system has been suggested to prote...
The introduction of Bitcoin in 2008 has sparked wide attention as the concept of a decentralized cry...
With the development of network technology, privacy protection and users anonymity become a new rese...
With the development of network technology, privacy protection and users anonymity become a new rese...
An encryption method is presented with the novel property that publicly revealing an encryption key ...
This thesis addresses the question what cryptography can do for one personally, i.e., it looks at se...
In traditional public key cryptography, public keys of users are essentially random strings generate...
Key agreement and digital signature are two significant and most useful contributions of modern cryp...
Bitcoin is a peer-to-peer electronic cash system largely used for online financial transactions. It ...
An encryption method is presented with the novel property that publicly revealing an encryption key ...
We develop a three-level hierarchy of privacy notions for (un-forgeable) digital signature schemes. ...
Recently, blockchain technology has garnered support. However, an attenuating factor to its global a...
© Springer Nature Switzerland AG 2020. As a widely used privacy-preserving technique for cryptocurre...
First proposed in CryptoNote, a collection of popular privacy-centric cryptocurrencies have employed...
First proposed in CryptoNote, a collection of popular privacy-centric cryptocurrencies have employed...
[[abstract]]Recently, the notion of the key-insulated public- key system has been suggested to prote...
The introduction of Bitcoin in 2008 has sparked wide attention as the concept of a decentralized cry...
With the development of network technology, privacy protection and users anonymity become a new rese...
With the development of network technology, privacy protection and users anonymity become a new rese...
An encryption method is presented with the novel property that publicly revealing an encryption key ...
This thesis addresses the question what cryptography can do for one personally, i.e., it looks at se...
In traditional public key cryptography, public keys of users are essentially random strings generate...
Key agreement and digital signature are two significant and most useful contributions of modern cryp...
Bitcoin is a peer-to-peer electronic cash system largely used for online financial transactions. It ...
An encryption method is presented with the novel property that publicly revealing an encryption key ...
We develop a three-level hierarchy of privacy notions for (un-forgeable) digital signature schemes. ...
Recently, blockchain technology has garnered support. However, an attenuating factor to its global a...