搜索结果: 1-15 共查到“军队指挥学 Blockchain”相关记录82条 . 查询时间(0.093 秒)
Privacy-preserving auditable token payments in a permissioned blockchain system
cryptographic protocols AML
font style='font-size:12px;'>
2019/9/19
Token management systems were the first application of blockchain technology and are still the most widely used one. Early implementations such as Bitcoin or Ethereum provide virtually no privacy beyo...
Puncturable Signatures and Applications in Proof-of-Stake Blockchain Protocol
Puncturable Signatures PoS Blockchain
font style='font-size:12px;'>
2019/8/30
Proof-of-stake (PoS) blockchain protocols are emerging as one of the most promising alternative to the energy-consuming proof-of-work protocols. However, one particularly critical threat in the PoS se...
Blockchain-enabled Cryptographically-secure Hardware Obfuscation
IP Piracy Logic Locking Hardware Obfuscation
font style='font-size:12px;'>
2019/8/19
Electronic chips in consumer, industrial, and military applications are targeted by untrusted entities in the design and fabrication process, aiming at reverse-engineering and Intellectual Property (I...
Kadcast: A Structured Approach to Broadcast in Blockchain Networks
broadcast blockchain cryptocurrency peer-to-peer
font style='font-size:12px;'>
2019/8/2
In order to propagate transactions and blocks, today’s blockchain systems rely on unstructured peer-to-peer overlay networks. In such networks, broadcast is known to be an inefficient operation in ter...
A Blockchain-Based Access Control Scheme for Smart Grids
smart grids access control blockchain
font style='font-size:12px;'>
2019/8/2
At present, the access control schemes in the power grid are centralized. In the centralized system, the data of the network sensor nodes is transmitted by centralized nodes, and the data itself may b...
k-root-n: An efficient O(√n) algorithm for avoiding short term double spending in Distributed Ledger Technologies such as Blockchain
Blockchain bitcoin distributed ledger technology
font style='font-size:12px;'>
2019/7/17
Blockchains such as bitcoin rely on reaching global consensus for the distributed ledger, and suffer from a well know scalability problem. We propose an algorithm which can avoid double spending in th...
SoK of Used Cryptography in Blockchain
Blockchain consensus hash function
font style='font-size:12px;'>
2019/6/24
The underlying fundaments of blockchain are cryptography and cryptographic concepts that provide reliable and secure decentralized solutions. Although many recent papers study the use-cases of blockch...
A Blockchain-Assisted Hash-Based Signature Scheme
digital signatures hash functions public-key cryptography
font style='font-size:12px;'>
2019/6/10
We present a server-supported, hash-based digital signature scheme. To achieve greater efficiency than current state of the art, we relax the security model somewhat. We postulate a set of design requ...
Timed Signatures and Zero-Knowledge Proofs -Timestamping in the Blockchain Era-
Blockchain Digital Signatures Zero-knowledge Proofs
font style='font-size:12px;'>
2019/6/5
Timestamping is an important cryptographic primitive with numerous applications. The availability of a decentralized blockchain such as that offered by the Bitcoin protocol offers new possibilities to...
Trustless, Censorship-Resilient and Scalable Votings in the Permission-based Blockchain Model
DAO voting functional encryption
font style='font-size:12px;'>
2019/6/4
Voting systems are the tool of choice when it comes to settle an agreement of different opinions. We propose a solution for a trustless, censorship-resilient and scalable electronic voting platform. B...
BlockQuick: Super-Light Client Protocol for Blockchain Validation on Constrained Devices
blockchain proof of work
font style='font-size:12px;'>
2019/5/29
Today server authentication is largely handled through Public Key Infrastructure (PKI) in both the private and the public sector. PKI is established as the defacto standard for Internet communication ...
RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security
confidential transaction ring signatures set membership proof
font style='font-size:12px;'>
2019/5/21
In this paper, we propose the most competent blockchain ring confidential transaction protocol (RingCT3.0) for protecting the privacy of the sender's identity, the recipient's identity and the confide...
Revisiting Privacy-aware Blockchain Public Key Infrastructure
Blockchain Public Key Infrastructure Privacy
font style='font-size:12px;'>
2019/5/21
Privacy-aware Blockchain Public Key Infrastructure (PB- PKI) is a recent proposal by Louise Axon (2017) to create a privacy-preserving Public Key Infrastructure on the Blockchain. However, PB-PKI suff...
Revisiting Privacy-aware Blockchain Public Key Infrastructure
Blockchain Public Key Infrastructure Privacy
font style='font-size:12px;'>
2019/5/21
Privacy-aware Blockchain Public Key Infrastructure (PB- PKI) is a recent proposal by Louise Axon (2017) to create a privacy-preserving Public Key Infrastructure on the Blockchain. However, PB-PKI suff...
UniqueChain: A Fast, Provably Secure Proof-of-Stake Based Blockchain Protocol in the Open Setting
proof-of-stake secure initialization uniqueness
font style='font-size:12px;'>
2019/5/13
We present "UniqueChain", a proof-of-stake based blockchain protocol that achieves secure initialization of newly joining parties without any additional trusted assumptions and fast messages (transact...