A sequence of recent works have constructed constant-size quasi-adaptive (QA) NIZK arguments of membership in linear subspaces of ̂ G^ m, where ̂ G is a group equipped …
L Wang, J Liu, W Liu - Concurrency and Computation: Practice …, 2021 - Wiley Online Library
For many years, non‐repudiation in data delivery has not been satisfactorily achieved due to the difficulty of supervising delivery behavior. Existing fair protocols are still not entirely free …
The blockchain space is changing constantly. New chains are being implemented frequently with different use cases in mind. As more and more types of crypto assets are getting real …
Z Zhu, R Zhang, Y Tao - Cybersecurity, 2024 - Springer
Abstract Atomic Cross-Chain Swap (ACCS) is one important topic in cryptocurrency, where users can securely and trustlessly exchange assets between two different blockchains …
K Acharya, R Dutta - Information Security and Cryptology–ICISC 2016 …, 2017 - Springer
In this paper, we put forward first adaptively chosen plaintext attack (CPA) secure broadcast encryption with dealership (BED) scheme in standard model. We achieve adaptive security …
K Acharya, R Dutta - Journal of Information Security and Applications, 2021 - Elsevier
Broadcast encryption with dealership (BED) introduced by Gritti et al.(2015) is a proficient cryptographic primitive which involves a third party called as a dealer and creates a …
JS Kim, Y Lee, J Eom, DH Lee - … Security and Cryptology–ICISC 2017: 20th …, 2018 - Springer
The broadcast encryption with dealership (BED) scheme allows a dealer, instead of a broadcaster, to manage a recipient. Unlike prior broadcast encryption schemes, BED …
S Mukherjee, A Majumder - Cryptology ePrint Archive, 2021 - eprint.iacr.org
Broadcast Encryption allows a sender to send a message to more than one receiver. In a typical broadcast encryption, the broadcaster decides the privileged set as in who all can …