The welch-gong stream cipher-evolutionary path

N Zidarič, K Mandal, G Gong, M Aagaard - Cryptography and …, 2024 - Springer
This survey presents the rich history of the Welch-Gong (WG) Stream cipher family. It has
been a long journey that lead the WG stream ciphers to become practical. The evolutionary …

A New Hash-Based Enhanced Privacy ID Signature Scheme

L Chen, C Dong, N El Kassem, CJP Newton… - … Conference on Post …, 2024 - Springer
The elliptic curve-based Enhanced Privacy ID (EPID) signature scheme is broadly used for
hardware enclave attestation by many platforms that implement Intel Software Guard …

Privacy-Preserving Ownership Transfer: Challenges and An Outlined Solution Based on Zero-Knowledge Proofs

M Badakhshan, G Gong - 2023 IEEE 9th World Forum on …, 2023 - ieeexplore.ieee.org
Although employing blockchain in supply chain management (SCM) can provide benefits in
numerous aspects such as traceability, transparency, and more, using public blockchain for …

Zupply: Anonymously Maintained Decentralized DAG Data Record Over Public Blockchains

M Badakhshan, G Gong - techrxiv.org
In this paper, we introduce Zupply, a framework designed for anonymous and decentralized
maintenance of directed acyclic graphs (DAGs) structured authentic data records. We …

[PDF][PDF] Blockchain Privacy and Its Applications in Healthcare

G Gong - Preface from Dr. Vivek Goel - uwaterloo.ca
In this short survey, we first introduce some basic concepts of blockchain technologies and
Bitcoin networks, address the problem on privacy in Blockchain systems, and explain a …