The transactions in blockchain framework, based cryptocurrencies are publicly available, thereby accessible to all users by design. However, the anonymity of blockchain …
In this work, we initially study the necessary properties and security requirements of Ring Confidential Transaction (RingCT) protocol deployed in the popular anonymous …
C Lai, R Lu, D Zheng, X Shen - IEEE Network, 2020 - ieeexplore.ieee.org
Recently, many academic institutions and standardization organizations have conducted research on vehicular communications based on LTE or 5G. As the most important …
“Bitcoin”[1] has been a successful implementation of the concept of p2p electronic cash. Both professionals and the general public have come to appreciate the convenient …
In this paper, we construct a Lattice-based one-time Linkable Ring Signature (L2RS) scheme, which enables the public to verify if two or more signatures were generated by …
Abstract Internet-of-Things (IoT) envisions communications between heterogeneous devices and utilization of the associated data for smart decision making. Blockchain bridges the gap …
D Boneh, C Komlo - Annual International Cryptology Conference, 2022 - Springer
Existing threshold signature schemes come in two flavors:(i) fully private, where the signature reveals nothing about the set of signers that generated the signature, and (ii) …
In this paper, we construct a linkable ring signature scheme with unconditional anonymity. It has been regarded as an open problem in [22] since 2004 for the construction of an …
With opportunities brought by Internet of Things (IoT), it is quite a challenge to assure privacy preservation when a huge number of resource-constrained distributed devices is involved …