A survey on exotic signatures for post-quantum blockchain: Challenges and research directions

M Buser, R Dowsley, M Esgin, C Gritti… - ACM Computing …, 2023 - dl.acm.org
Blockchain technology provides efficient and secure solutions to various online activities by
utilizing a wide range of cryptographic tools. In this article, we survey the existing literature …

Survey of promising technologies for quantum drones and networks

A Kumar, S Bhatia, K Kaushik, SM Gandhi… - Ieee …, 2021 - ieeexplore.ieee.org
Due to recent advancements in quantum drones, the Internet of Quantum Drones (IoQDs),
and Drone-to-Satellite connectivity, several advantages have been anticipated for real-time …

Post-quantum era privacy protection for intelligent infrastructures

L Malina, P Dzurenda, S Ricci, J Hajny… - IEEE …, 2021 - ieeexplore.ieee.org
As we move into a new decade, the global world of Intelligent Infrastructure (II) services
integrated into the Internet of Things (IoT) are at the forefront of technological advancements …

[图书][B] Concise encyclopedia of coding theory

WC Huffman, JL Kim, P Solé - 2021 - api.taylorfrancis.com
Most coding theory experts date the origin of the subject with the 1948 publication of A
Mathematical Theory of Communication by Claude Shannon. Since then, coding theory has …

Advanced signature functionalities from the code equivalence problem

A Barenghi, JF Biasse, T Ngo… - International Journal of …, 2022 - Taylor & Francis
The LESS signature scheme, introduced in 2020, represented a fresh start for code-based
signatures. In this paper we explore advanced functionalities for signature schemes …

A new efficient threshold ring signature scheme based on coding theory

CA Melchor, PL Cayrel, P Gaborit… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
Ring signatures were introduced by Rivest, Shamir, and Tauman in 2001. These signatures
allow a signer to anonymously authenticate a message on behalf of a group of his choice …

Sok: Privacy-preserving signatures

A Chator, M Green, PR Tiwari - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Modern security systems depend fundamentally on the ability of users to authenticate their
communications to other parties in a network. Unfortunately, cryptographic authentication …

Proofs of retrievability with tag outsourcing based on Goppa codes

S Ji, W Zhou, C Ma, D Li, K Zhu, L Fang - Computer Standards & Interfaces, 2023 - Elsevier
In cloud storage, because the data owner loses the physical control of the data, the data may
be tampered with or deleted. Although, it has been proposed to adopt provable data …

[PDF][PDF] Analysis of code-based digital signature schemes.

R Khurana, E Narwal - International Journal of Electrical & …, 2023 - researchgate.net
Digital signatures are in high demand because they allow authentication and non-
repudiation. Existing digital signature systems, such as digital signature algorithm (DSA) …

Provably secure code-based threshold ring signatures

L Dallot, D Vergnaud - IMA International Conference on Cryptography and …, 2009 - Springer
A threshold ring signature scheme enables a set of users to sign a message such that a
finite set of possible signers (the ring) is identified, without revealing which subset of ring …