环签名与虚拟货币

来源 :中国密码学会2017年密码算法学术会议 | 被引量 : 0次 | 上传用户:wang1224
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
  Introduced in 2001, a ring signature is a type of digital signature that can be created by anyone in a group of people.In contrast to group signatures, ring signatures are ad-hoc and do not require any coordination among the users.It is originally designed as a way to leak a secret.Since then.it has found applications as a building in other cryptographic primitives, such as optimistic fair exchange,designated verifier signatures and ad-hoc key exchange.In this talk, we are going to reviewexisting results on ring signatures and their variants.Next, we introduce Monero, one of the most popular blockchain-based crypto-currencies.In particular,we discuss how variants of ring signatures are applied in Monero to ensure its security and privacy.We conclude the talk with some open problems related to the use of ring signatures in blockchain-based crypto-currency and some promising directions.
其他文献
本文阐述了当前铸钢件生产工艺现状以及面临的难题,给出了“无废砂排放、砂型高溃散抗潮、降低型砂成本、实现绿色铸造”的答案,并通过大量的生产应用实践,说明新型改性水玻
该项目依托太重滨海锻压设备分公司生产的350MN多向复合挤压液压模锻设备,该设备由德国著名的潘克公司设计,打破了以往压机设备单向挤压的传统理念,集立式压机、卧式压机于一
  As the most prevailing two-factor authentication mechanism,smart-card-based password authentication has been a subject of intensive research in the past two
SMS4算法是中国无线网络的标准算法.吕继强和孙兵等人分别在ICICS 2007和CRYPTO2015上研究了12轮SMS4算法的不可能差分和零相关线性分析,本文证明了吕继强和孙兵等人构造的区
  Permutation polynomials (PPs) of the form (xq-x + c)q2-1/3+1 + x over Fq2 were presented by Li et al.(Finite Fields Appl 22:16-23,2013).More recently,we hav
  Vectorial Boolean functions are used as the nonlinear components in stream ciphers.The security of the cipher system depends on the cryptographic properties
  Wearable devices can be potentially captured or accessed in an unauthorized manner because of their physical nature.In such cases,they are in white-box atta
  2016年全球智能手机销售量达14亿,远超过个人电脑销售量.移动智能终端(包含智能手机、平板电脑、智能手表等)已成为人们不可或缺的随身设备,越来越多的个人隐私资料不可
会议
  Efficient searching on encrypted data outsourced to the cloud remains a research challenge.Identity-based encryption with equality test (IBEET) scheme has r
  哈希函数作为重要的密码基础算法之一,在多个密码安全协议中得到了广泛的应用。如何构造一个安全的哈希函数也就成为了现代密码学的重要课题。密码学家开展了持续深入的研
会议