Origami Store: UC-Secure Foldable Datachains for the Quantum Era
暂无分享,去创建一个
[1] Melanie Swan,et al. Blockchain Thinking : The Brain as a Decentralized Autonomous Corporation [Commentary] , 2015, IEEE Technol. Soc. Mag..
[2] Lianhai Wang,et al. A Blockchain System Based on Quantum-Resistant Digital Signature , 2021, Secur. Commun. Networks.
[3] Elaine Shi,et al. Bitter to Better - How to Make Bitcoin a Better Currency , 2012, Financial Cryptography.
[4] Chen-Mou Cheng,et al. New Differential-Algebraic Attacks and Reparametrization of Rainbow , 2008, ACNS.
[5] Mostafa Belkasmi,et al. Bitcoin Security with Post Quantum Cryptography , 2019, NETYS.
[6] Matthew Green,et al. Zerocoin: Anonymous Distributed E-Cash from Bitcoin , 2013, 2013 IEEE Symposium on Security and Privacy.
[7] Aggelos Kiayias,et al. Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability , 2018, IACR Cryptol. ePrint Arch..
[8] Wei Peng,et al. Proof of Reputation: A Reputation-Based Consensus Protocol for Peer-to-Peer Network , 2018, DASFAA.
[9] Reza Azarderakhsh,et al. Key Compression for Isogeny-Based Cryptosystems , 2016, AsiaPKC '16.
[10] Stefan Jähnichen,et al. Self-sovereign Identity - Opportunities and Challenges for the Digital Revolution , 2017, ArXiv.
[11] Dan Boneh,et al. Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains , 2019, IACR Cryptol. ePrint Arch..
[12] Zhenfei Zhang,et al. Falcon: Fast-Fourier Lattice-based Compact Signatures over NTRU , 2019 .
[13] Chanathip Namprempre,et al. From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security , 2002, EUROCRYPT.
[14] Guido Perboli,et al. Blockchain in Logistics and Supply Chain: A Lean Approach for Designing Real-World Use Cases , 2018, IEEE Access.
[15] Paulo S. L. M. Barreto,et al. The Lattice-Based Digital Signature Scheme qTESLA , 2020, IACR Cryptol. ePrint Arch..
[16] Ittai Abraham,et al. Aggregatable Subvector Commitments for Stateless Cryptocurrencies , 2020, IACR Cryptol. ePrint Arch..
[17] Marco Baldi,et al. Post-quantum cryptography based on codes: State of the art and open challenges , 2017, 2017 AEIT International Annual Conference.
[18] Yonggang Wen,et al. A Survey on Consensus Mechanisms and Mining Strategy Management in Blockchain Networks , 2018, IEEE Access.
[19] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[20] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[21] E. O. Kiktenko,et al. Quantum-secured blockchain , 2017, Quantum Science and Technology.
[22] Mohammad S. Obaidat,et al. Edge Computing Based Healthcare Systems: Enabling Decentralized Health Monitoring in Internet of Medical Things , 2020, IEEE Network.
[23] Georg Fuchsbauer,et al. Aggregate Cash Systems: A Cryptographic Investigation of Mimblewimble , 2019, IACR Cryptol. ePrint Arch..
[24] Marko Hölbl,et al. A Systematic Review of the Use of Blockchain in Healthcare , 2018, Symmetry.
[25] Lin Chen,et al. On Security Analysis of Proof-of-Elapsed-Time (PoET) , 2017, SSS.
[26] Moti Yung,et al. Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs , 2010, TCC.
[27] Dragos Velicanu,et al. A Decentralized Public Key Infrastructure with Identity Retention , 2014, IACR Cryptol. ePrint Arch..
[28] Xavier Boyen,et al. Lattice Mixing and Vanishing Trapdoors A Framework for Fully Secure Short Signatures and more , 2010 .
[29] K. Sneha,et al. Blockchain Identity Management , 2022, Essential Enterprise Blockchain Concepts and Applications.
[30] Moti Yung,et al. Functional Commitment Schemes: From Polynomial Commitments to Pairing-Based Accumulators from Simple Assumptions , 2016, ICALP.
[31] John M. Easton,et al. Towards Encrypting Industrial Data on Public Distributed Networks , 2018, 2018 IEEE International Conference on Big Data (Big Data).
[32] Mario E. Magaña,et al. Post-quantum hybrid security mechanism for MIMO systems , 2017, 2017 International Conference on Computing, Networking and Communications (ICNC).
[33] Boi Faltings,et al. An incentive compatible reputation mechanism , 2003, AAMAS '03.
[34] Roberto Baldoni,et al. PBFT vs Proof-of-Authority: Applying the CAP Theorem to Permissioned Blockchain , 2018, ITASEC.
[35] Daniel Davis Wood,et al. ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .
[36] Dipankar Dasgupta,et al. A survey of blockchain from security perspective , 2019, J. Bank. Financial Technol..
[37] Sunny King,et al. PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake , 2012 .
[38] Feng Tian,et al. An agri-food supply chain traceability system for China based on RFID & blockchain technology , 2016, 2016 13th International Conference on Service Systems and Service Management (ICSSSM).
[39] Bo-Yin Yang,et al. Tame Transformation Signatures With Topsy-Turvy Hashes , .
[40] Johannes A. Buchmann,et al. XMSS - A Practical Forward Secure Signature Scheme based on Minimal Security Assumptions , 2011, IACR Cryptol. ePrint Arch..
[41] Leonid Reyzin,et al. Improving Authenticated Dynamic Dictionaries, with Applications to Cryptocurrencies , 2017, Financial Cryptography.
[42] Jian Li,et al. A New Lattice-Based Signature Scheme in Post-Quantum Blockchain Network , 2019, IEEE Access.
[43] William J. Knottenbelt,et al. Committing to quantum resistance: a slow defence for Bitcoin against a fast quantum computing attack , 2018, Royal Society Open Science.
[44] Khaled Salah,et al. IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..
[45] Chris Peikert,et al. On Ideal Lattices and Learning with Errors over Rings , 2010, JACM.
[46] Steven D. Galbraith,et al. Identification Protocols and Signature Schemes Based on Supersingular Isogeny Problems , 2017, ASIACRYPT.
[47] Oscar Novo,et al. Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT , 2018, IEEE Internet of Things Journal.
[48] Samuel Fosso Wamba,et al. Blockchain adoption challenges in supply chain: An empirical investigation of the main drivers in India and the USA , 2019, Int. J. Inf. Manag..
[49] Dario Fiore,et al. Vector Commitments and Their Applications , 2013, Public Key Cryptography.
[50] C. P. Schnorr,et al. Efficient Identification and Signatures for Smart Cards (Abstract) , 1989, EUROCRYPT.
[51] Xavier Boyen,et al. Graphchain: a Blockchain-Free Scalable Decentralised Ledger , 2018, BCC '18.
[52] Xiao Wang,et al. Blockchain-Powered Parallel Healthcare Systems Based on the ACP Approach , 2018, IEEE Transactions on Computational Social Systems.
[53] Sudheendra Hangal,et al. PrPl: a decentralized social networking infrastructure , 2010, MCS '10.
[54] Zhenfei Zhang,et al. Pointproofs: Aggregating Proofs for Multiple Vector Commitments , 2020, IACR Cryptol. ePrint Arch..
[55] Hovav Shacham,et al. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.
[56] Yury Yanovich,et al. Converging blockchain and next-generation artificial intelligence technologies to decentralize and accelerate biomedical research and healthcare , 2015, Oncotarget.
[57] Mickael Bech,et al. The Danish health care system: evolution--not revolution--in a decentralized system. , 2005, Health Economics.
[58] Craig Gentry,et al. Trapdoors for hard lattices and new cryptographic constructions , 2008, IACR Cryptol. ePrint Arch..
[59] Khaled Salah,et al. Blockchain for AI: Review and Open Research Challenges , 2019, IEEE Access.
[60] Alice Cheng,et al. Sybilproof reputation mechanisms , 2005, P2PECON '05.
[61] Tomi Dahlberg,et al. Digital Supply Chain Transformation toward Blockchain Integration , 2017, HICSS.
[62] Yumin Wang,et al. Toward Quantum-Resistant Strong Designated Verifier Signature from Isogenies , 2012, 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems.
[63] Ueli Maurer,et al. Bitcoin as a Transaction Ledger: A Composable Treatment , 2017, CRYPTO.
[64] Daniel E. O'Leary,et al. Configuring Blockchain Architectures for Transaction Information in Blockchain Consortiums: The Case of Accounting and Supply Chain Systems , 2017, Intell. Syst. Account. Finance Manag..
[65] Aggelos Kiayias,et al. A Composable Security Treatment of the Lightning Network , 2020, 2020 IEEE 33rd Computer Security Foundations Symposium (CSF).
[66] Roy H. Campbell,et al. World of Empowered IoT Users , 2016, 2016 IEEE First International Conference on Internet-of-Things Design and Implementation (IoTDI).
[67] Paula Fraga-Lamas,et al. Towards Post-Quantum Blockchain: A Review on Blockchain Cryptography Resistant to Quantum Computing Attacks , 2020, IEEE Access.
[68] Vadim Lyubashevsky,et al. Lattice Signatures Without Trapdoors , 2012, IACR Cryptol. ePrint Arch..
[69] H. Krumholz,et al. Blockchain Technology: Applications in Health Care , 2017, Circulation. Cardiovascular quality and outcomes.
[70] Reza Azarderakhsh,et al. A Post-quantum Digital Signature Scheme Based on Supersingular Isogenies , 2017, Financial Cryptography.
[71] Quanlong Wang,et al. A Simple Voting Protocol on Quantum Blockchain , 2018, International Journal of Theoretical Physics.
[72] Quanlong Wang,et al. Towards Quantum-Secured Permissioned Blockchain: Signature, Consensus, and Logic , 2019, Entropy.
[73] Bo-Yin Yang,et al. Design Principles for HFEv- Based Multivariate Signature Schemes , 2015, ASIACRYPT.
[74] Soohyung Kim,et al. Managing IoT devices using blockchain platform , 2017, 2017 19th International Conference on Advanced Communication Technology (ICACT).
[75] Ahmed Serhrouchni,et al. Bubbles of Trust: A decentralized blockchain-based authentication system for IoT , 2018, Comput. Secur..
[76] Eli Ben-Sasson,et al. Zerocash: Decentralized Anonymous Payments from Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.
[77] Peter Schwabe,et al. SPHINCS: Practical Stateless Hash-Based Signatures , 2015, EUROCRYPT.
[78] Daniel Slamanig,et al. Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives , 2017, CCS.
[79] R. Monfared,et al. Blockchain ready manufacturing supply chain using distributed ledger , 2016 .
[80] Aggelos Kiayias,et al. Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol , 2017, CRYPTO.
[81] Vadim Lyubashevsky,et al. Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures , 2009, ASIACRYPT.
[82] Praveen Gauravaram,et al. Blockchain for IoT security and privacy: The case study of a smart home , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).
[83] Vlastimil Clupek,et al. Secure digital archiving in post-quantum era , 2015, 2015 38th International Conference on Telecommunications and Signal Processing (TSP).
[84] James Brown,et al. Blockchained Post-Quantum Signatures , 2018, 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).
[85] Elmar Fürst,et al. Blockchain for and in Logistics: What to Adopt and Where to Start , 2018, Logistics.
[86] Ran Canetti,et al. Universally composable signature, certification, and authentication , 2004, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004..
[87] Blockchain for E-Healthcare Systems: Easier Said Than Done , 2020 .
[88] Nicolas Courtois. On multivariate signature-only public key cryptosystems , 2001, IACR Cryptol. ePrint Arch..
[89] D. Baars. Towards self-sovereign identity using blockchain technology , 2016 .
[90] Nabil Bouzerna,et al. Towards Better Availability and Accountability for IoT Updates by Means of a Blockchain , 2017, 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
[91] Charalampos Papamanthou,et al. Edrax: A Cryptocurrency with Stateless Transaction Validation , 2018, IACR Cryptol. ePrint Arch..
[92] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[93] Tanesh Kumar,et al. Blockchain Utilization in Healthcare: Key Requirements and Challenges , 2018, 2018 IEEE 20th International Conference on e-Health Networking, Applications and Services (Healthcom).
[94] William Whyte,et al. Performance Improvements and a Baseline Parameter Generation Algorithm for NTRUSign , 2005, IACR Cryptol. ePrint Arch..
[95] Tanja Lange,et al. Flush, Gauss, and reload : a cache attack on the BLISS lattice-based signature scheme , 2016 .
[96] David Jao,et al. Efficient Compression of SIDH Public Keys , 2017, EUROCRYPT.
[97] Aviv Zohar,et al. Secure High-Rate Transaction Processing in Bitcoin , 2015, Financial Cryptography.
[98] Fucai Zhou,et al. A (Zero-Knowledge) Vector Commitment with Sum Binding and its Applications , 2020, Comput. J..
[99] Andrei Lebedev,et al. YAC: BFT Consensus Algorithm for Blockchain , 2018, ArXiv.
[100] Alberto Montresor,et al. Efficient dissemination in decentralized social networks , 2011, 2011 IEEE International Conference on Peer-to-Peer Computing.
[101] Ying Sun,et al. A Secure Cryptocurrency Scheme Based on Post-Quantum Blockchain , 2018, IEEE Access.
[102] Christoph Meinel,et al. A Survey on Essential Components of a Self-Sovereign Identity , 2018, Comput. Sci. Rev..
[103] Leslie Lamport,et al. Constructing Digital Signatures from a One Way Function , 2016 .
[104] Damien Stehlé,et al. CRYSTALS-Dilithium: A Lattice-Based Digital Signature Scheme , 2018, IACR Trans. Cryptogr. Hardw. Embed. Syst..
[105] Nagaveni B. Biradar,et al. IOTA-Next Generation Block chain , 2018 .
[106] Jim Groom,et al. The Path to Self-Sovereign Identity , 2017 .