Zero-History Confidential Chains with Zero-Knowledge Contracts: A New Normal for Decentralized Ledgers?

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:European Symposium on Research in Computer Security (27. : 2022 : Kopenhagen; Online) Computer security - ESORICS 2022 ; Part 1
1. Verfasser: Alupotha, Jayamine (VerfasserIn)
Weitere Verfasser: Boyen, Xavier (VerfasserIn), McKague, Matthew (VerfasserIn)
Pages:2022
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2022
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
A Blockchain-Based Long-Term Time-Stamping Scheme 2022 Meng, Long
Post-Quantum Verifiable Random Function from Symmetric Primitives in PoS Blockchain 2022 Buser, Maxime
Opportunistic Algorithmic Double-Spending: How I Learned to Stop Worrying and Love the Fork 2022 Stifter, Nicholas
Enhancing User Privacy in Mobile Devices Through Prediction of Privacy Preferences 2022 Mendes, Ricardo
INC: In-Network Classification of Botnet Propagation at Line Rate 2022 Friday, Kurt
GAME: Generative-Based Adaptive Model Extraction Attack 2022 Xie, Yi
SeInspect: Defending Model Stealing via Heterogeneous Semantic Inspection 2022 Liu, Xinjing
XSPIR: Efficient Symmetrically Private Information Retrieval from Ring-LWE 2022 Lin, Chengyu
Spatial Encryption Revisited: From Delegatable Multiple Inner Product Encryption and More 2022 Le, Huy Quoc
Public Key Authenticated Encryption with Keyword Search from LWE 2022 Cheng, Leixiao
New Unbounded Verifiable Data Streaming for Batch Query with Almost Optimal Overhead 2022 Wu, Jiaojiao
No-Directional and Backward-Leak Uni-Directional Updatable Encryption Are Equivalent 2022 Chen, Huanhuan
Two Types of Novel DoS Attacks Against CDNs Based on HTTP/2 Flow Control Mechanism 2022 Song, Hengxian
Kallima: A Clean-Label Framework for Textual Backdoor Attacks 2022 Chen, Xiaoyi
Zero-History Confidential Chains with Zero-Knowledge Contracts: A New Normal for Decentralized Ledgers? 2022 Alupotha, Jayamine
Secure Hierarchical Deterministic Wallet Supporting Stealth Address 2022 Yin, Xin
Zero-Knowledge Age Restriction for GNU Taler 2022 Kesim, Özgür
Privacy Leakage in Privacy-Preserving Neural Network Inference 2022 Wei, Mengqi
Generic Construction of Trace-and-Revoke Inner Product Functional Encryption 2022 Luo, Fucai
Scaling up GAEN Pseudorandom Processes: Preparing for a More Extensive Pandemic 2022 David, Liron
Alle Artikel auflisten