Advanced digital signatures for preserving privacy and trust management in hierarchical heterogeneous IoT: Taxonomy, capabilities, and objectives

MR Alagheband, A Mashatan - Internet of Things, 2022 - Elsevier
Abstract Internet of Things (IoT) systems in different areas, such as manufacturing,
transportation, and healthcare, are the convergence of several technologies. There are …

[PDF][PDF] Zcash protocol specification

D Hopwood, S Bowe, T Hornby, N Wilcox - GitHub: San Francisco, CA …, 2016 - zeccoin.net
Zcash is an implementation of the Decentralized Anonymous Payment scheme Zerocash,
with security fixes and improvements to performance and functionality. It bridges the existing …

Zexe: Enabling decentralized private computation

S Bowe, A Chiesa, M Green, I Miers… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Ledger-based systems that support rich applications often suffer from two limitations. First,
validating a transaction requires re-executing the state transition that it attests to. Second …

Chameleon-hashes with ephemeral trapdoors: And applications to invisible sanitizable signatures

J Camenisch, D Derler, S Krenn, HC Pöhls… - … -Key Cryptography–PKC …, 2017 - Springer
A chameleon-hash function is a hash function that involves a trapdoor the knowledge of
which allows one to find arbitrary collisions in the domain of the function. In this paper, we …

Quisquis: A new design for anonymous cryptocurrencies

P Fauzi, S Meiklejohn, R Mercer, C Orlandi - Advances in Cryptology …, 2019 - Springer
Despite their usage of pseudonyms rather than persistent identifiers, most existing
cryptocurrencies do not provide users with any meaningful levels of privacy. This has …

ROAST: robust asynchronous schnorr threshold signatures

T Ruffing, V Ronge, E Jin, J Schneider-Bensch… - Proceedings of the …, 2022 - dl.acm.org
Bitcoin and other cryptocurrencies have recently introduced support for Schnorr signatures
whose cleaner algebraic structure, as compared to ECDSA, allows for simpler and more …

Building redactable consortium blockchain for industrial Internet-of-Things

K Huang, X Zhang, Y Mu, X Wang… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Applying consortium blockchain as a trust layer for heterogeneous industrial Internet-of-
Things devices is cost-effective. However, with an increase in computing power, some …

Aggregatable distributed key generation

K Gurkan, P Jovanovic, M Maller, S Meiklejohn… - … Conference on the …, 2021 - Springer
In this paper, we introduce a distributed key generation (DKG) protocol with aggregatable
and publicly-verifiable transcripts. Compared with prior publicly-verifiable approaches, our …

Token meets wallet: Formalizing privacy and revocation for FIDO2

L Hanzlik, J Loss, B Wagner - 2023 IEEE Symposium on …, 2023 - ieeexplore.ieee.org
The FIDO2 standard is a widely-used class of challenge-response type protocols that allows
to authenticate to an online service using a hardware token. Barbosa et al.(CRYPTO '21) …

The exact security of BIP32 wallets

P Das, A Erwig, S Faust, J Loss, S Riahi - Proceedings of the 2021 ACM …, 2021 - dl.acm.org
In many cryptocurrencies, the problem of key management has become one of the most
fundamental security challenges. Typically, keys are kept in designated schemes called …