Blockchains are gaining traction and acceptance, not just for cryptocurrencies, but increasingly as an architecture for distributed computing. In this work we seek solutions that …
In this paper, we introduce a distributed key generation (DKG) protocol with aggregatable and publicly-verifiable transcripts. Compared with prior publicly-verifiable approaches, our …
A secret sharing scheme enables one party to distribute shares of a secret to n parties and ensures that an adversary in control of t out of n parties will learn no information about the …
W Xiong, L Xiong - IEEE Access, 2020 - ieeexplore.ieee.org
In this paper, the first data trading certification blockchain solution based on consortium blockchain and smart contracts is proposed to solve the certification data security problem in …
All of us know that cryptography is an innovative security strategy. Network security construction with authentication techniques of its layers through blockchain technologies is …
Central banks around the world are exploring and in some cases even piloting central bank digital currencies (CBDCs). CBDCs promise to realize a broad range of new capabilities …
K Kanciak, K Wrona - International Journal of Electronics and …, 2020 - journals.pan.pl
We discuss the challenge of achieving an auditable key management for cryptographic access control to high-value sensitive data. In such settings it is important to be able to audit …
C Yan, H Xu, P Li - International Journal of Information Security and …, 2023 - igi-global.com
This article proposes a competitive-evolving-committee proactive secret sharing. Every participant in the system has the opportunity to become a member of the holding committee …