© Springer Nature Switzerland AG 2020. As a widely used privacy-preserving technique for cryptocurrencies, Stealth Address constitutes a key component of Ring Confidential Transaction (RingCT) protocol and it was adopted by Monero, one of the most popular privacy-centric cryptocurrencies. Recently, Liu et al. [EuroS&P 2019] pointed out a flaw in the current widely used stealth address algorithm that once a derived secret key is compromised, the damage will spread to the corresponding master secret key, and all the derived secret keys thereof. To address this issue, Liu et al. introduced Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key (PDPKS scheme), which captures the functionality, security, and priva...
While ring signatures can provide unconditional anonymity to the signing user, they are vulnerable t...
International audienceBasing signature schemes on strong lattice problems has been a long standing o...
Many evidences have showed that some intelligence agencies (often called big brother) attempt to mon...
First proposed in CryptoNote, a collection of popular privacy-centric cryptocurrencies have employed...
First proposed in CryptoNote, a collection of popular privacy-centric cryptocurrencies have employed...
© 2019 IEEE. Since the introduction of Bitcoin in 2008, cryptocurrency has been undergoing a quick a...
Privacy and control over data have become a public concern. Simultaneously, the increasing likelihoo...
Public-key cryptography is an indispensable component used in almost all of our present-day digital ...
In this paper, we construct an anonymous and decentralized cryptocash protocol which is secure in th...
Building cryptographic schemes upon as many fundamentally different hard problems as possible, seems...
In this paper, we construct a Lattice-based one-time Linkable Ring Signature (L2RS) scheme, which en...
Blockchain has revolutionized numerous fields, which include financial services, health care, the In...
Lattice-based cryptography is a prominent class of cryptographic systems that has been emerged as on...
In data security, the main objectives one tries to achieve are confidentiality, data integrity and a...
A ring signature scheme allows a group member to generate a signature on behalf of the whole group, ...
While ring signatures can provide unconditional anonymity to the signing user, they are vulnerable t...
International audienceBasing signature schemes on strong lattice problems has been a long standing o...
Many evidences have showed that some intelligence agencies (often called big brother) attempt to mon...
First proposed in CryptoNote, a collection of popular privacy-centric cryptocurrencies have employed...
First proposed in CryptoNote, a collection of popular privacy-centric cryptocurrencies have employed...
© 2019 IEEE. Since the introduction of Bitcoin in 2008, cryptocurrency has been undergoing a quick a...
Privacy and control over data have become a public concern. Simultaneously, the increasing likelihoo...
Public-key cryptography is an indispensable component used in almost all of our present-day digital ...
In this paper, we construct an anonymous and decentralized cryptocash protocol which is secure in th...
Building cryptographic schemes upon as many fundamentally different hard problems as possible, seems...
In this paper, we construct a Lattice-based one-time Linkable Ring Signature (L2RS) scheme, which en...
Blockchain has revolutionized numerous fields, which include financial services, health care, the In...
Lattice-based cryptography is a prominent class of cryptographic systems that has been emerged as on...
In data security, the main objectives one tries to achieve are confidentiality, data integrity and a...
A ring signature scheme allows a group member to generate a signature on behalf of the whole group, ...
While ring signatures can provide unconditional anonymity to the signing user, they are vulnerable t...
International audienceBasing signature schemes on strong lattice problems has been a long standing o...
Many evidences have showed that some intelligence agencies (often called big brother) attempt to mon...