Sok: Communication across distributed ledgers

A Zamyatin, M Al-Bassam, D Zindros… - … Cryptography and Data …, 2021 - Springer
Since the inception of Bitcoin, a plethora of distributed ledgers differing in design and
purpose has been created. While by design, blockchains provide no means to securely …

Can a public blockchain keep a secret?

F Benhamouda, C Gentry, S Gorbunov, S Halevi… - Theory of Cryptography …, 2020 - Springer
Blockchains are gaining traction and acceptance, not just for cryptocurrencies, but
increasingly as an architecture for distributed computing. In this work we seek solutions that …

Aggregatable distributed key generation

K Gurkan, P Jovanovic, M Maller, S Meiklejohn… - … Conference on the …, 2021 - Springer
In this paper, we introduce a distributed key generation (DKG) protocol with aggregatable
and publicly-verifiable transcripts. Compared with prior publicly-verifiable approaches, our …

Storing and retrieving secrets on a blockchain

V Goyal, A Kothapalli, E Masserova, B Parno… - … Conference on Public …, 2022 - Springer
A secret sharing scheme enables one party to distribute shares of a secret to n parties and
ensures that an adversary in control of t out of n parties will learn no information about the …

Data trading certification based on consortium blockchain and smart contracts

W Xiong, L Xiong - IEEE Access, 2020 - ieeexplore.ieee.org
In this paper, the first data trading certification blockchain solution based on consortium
blockchain and smart contracts is proposed to solve the certification data security problem in …

Multiple Layer Public Blockchain Approach for Internet of Things (IoT) Systems (January 2024)

TAAAA Bary, BM Elomda, HA Hassan - IEEE Access, 2024 - ieeexplore.ieee.org
All of us know that cryptography is an innovative security strategy. Network security
construction with authentication techniques of its layers through blockchain technologies is …

Design choices for central bank digital currency

S Allen, S Čapkun, I Eyal, G Fanti, BA Ford… - 2020 - infoscience.epfl.ch
Central banks around the world are exploring and in some cases even piloting central bank
digital currencies (CBDCs). CBDCs promise to realize a broad range of new capabilities …

[PDF][PDF] Towards an auditable cryptographic access control to high-value sensitive data

K Kanciak, K Wrona - International Journal of Electronics and …, 2020 - journals.pan.pl
We discuss the challenge of achieving an auditable key management for cryptographic
access control to high-value sensitive data. In such settings it is important to be able to audit …

[引用][C] Design Choices for Central Bank Digital Currency: Policy and Technical Considerations

S Allen - Brookings Institution, 2020

“Every Dog Has His Day”: Competitive-Evolving-Committee Proactive Secret Sharing With Capability-Based Encryption

C Yan, H Xu, P Li - International Journal of Information Security and …, 2023 - igi-global.com
This article proposes a competitive-evolving-committee proactive secret sharing. Every
participant in the system has the opportunity to become a member of the holding committee …