搜索结果: 1-15 共查到“Blockchain”相关记录83条 . 查询时间(0.078 秒)
英国工程技术学会与同济大学合作推出区块链领域全球首本国际期刊“IET Blockchain”电子与信息工程学院刘儿兀教授受邀担任创刊主编(图)
英国工程技术学会 同济大学 IET Blockchain 同济大学电子与信息工程学院 刘儿兀 主编 区块链
2020/7/12
2020年7月10日,在2020世界人工智能大会云端峰会上,英国工程技术学会(IET)与同济大学、上海区块链应用服务工程技术研究中心合作推出的全新开放获取期刊“IET Blockchain”发布。这是区块链专业领域全球第一本国际期刊,旨在发表与区块链基础理论、应用技术及产业发展相关的前沿研究成果、科技创新和最新观点。受邀担任该刊创刊主编的我校电子与信息工程学院刘儿兀教授在会上介绍了同济大学区块链研...
Privacy-preserving auditable token payments in a permissioned blockchain system
cryptographic protocols AML
2019/9/19
Token management systems were the first application of blockchain technology and are still the most widely used one. Early implementations such as Bitcoin or Ethereum provide virtually no privacy beyo...
Puncturable Signatures and Applications in Proof-of-Stake Blockchain Protocol
Puncturable Signatures PoS Blockchain
2019/8/30
Proof-of-stake (PoS) blockchain protocols are emerging as one of the most promising alternative to the energy-consuming proof-of-work protocols. However, one particularly critical threat in the PoS se...
Blockchain-enabled Cryptographically-secure Hardware Obfuscation
IP Piracy Logic Locking Hardware Obfuscation
2019/8/19
Electronic chips in consumer, industrial, and military applications are targeted by untrusted entities in the design and fabrication process, aiming at reverse-engineering and Intellectual Property (I...
Kadcast: A Structured Approach to Broadcast in Blockchain Networks
broadcast blockchain cryptocurrency peer-to-peer
2019/8/2
In order to propagate transactions and blocks, today’s blockchain systems rely on unstructured peer-to-peer overlay networks. In such networks, broadcast is known to be an inefficient operation in ter...
A Blockchain-Based Access Control Scheme for Smart Grids
smart grids access control blockchain
2019/8/2
At present, the access control schemes in the power grid are centralized. In the centralized system, the data of the network sensor nodes is transmitted by centralized nodes, and the data itself may b...
k-root-n: An efficient O(√n) algorithm for avoiding short term double spending in Distributed Ledger Technologies such as Blockchain
Blockchain bitcoin distributed ledger technology
2019/7/17
Blockchains such as bitcoin rely on reaching global consensus for the distributed ledger, and suffer from a well know scalability problem. We propose an algorithm which can avoid double spending in th...
The underlying fundaments of blockchain are cryptography and cryptographic concepts that provide reliable and secure decentralized solutions. Although many recent papers study the use-cases of blockch...
A Blockchain-Assisted Hash-Based Signature Scheme
digital signatures hash functions public-key cryptography
2019/6/10
We present a server-supported, hash-based digital signature scheme. To achieve greater efficiency than current state of the art, we relax the security model somewhat. We postulate a set of design requ...
Timed Signatures and Zero-Knowledge Proofs -Timestamping in the Blockchain Era-
Blockchain Digital Signatures Zero-knowledge Proofs
2019/6/5
Timestamping is an important cryptographic primitive with numerous applications. The availability of a decentralized blockchain such as that offered by the Bitcoin protocol offers new possibilities to...
Trustless, Censorship-Resilient and Scalable Votings in the Permission-based Blockchain Model
DAO voting functional encryption
2019/6/4
Voting systems are the tool of choice when it comes to settle an agreement of different opinions. We propose a solution for a trustless, censorship-resilient and scalable electronic voting platform. B...
BlockQuick: Super-Light Client Protocol for Blockchain Validation on Constrained Devices
blockchain proof of work
2019/5/29
Today server authentication is largely handled through Public Key Infrastructure (PKI) in both the private and the public sector. PKI is established as the defacto standard for Internet communication ...
RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security
confidential transaction ring signatures set membership proof
2019/5/21
In this paper, we propose the most competent blockchain ring confidential transaction protocol (RingCT3.0) for protecting the privacy of the sender's identity, the recipient's identity and the confide...
Revisiting Privacy-aware Blockchain Public Key Infrastructure
Blockchain Public Key Infrastructure Privacy
2019/5/21
Privacy-aware Blockchain Public Key Infrastructure (PB- PKI) is a recent proposal by Louise Axon (2017) to create a privacy-preserving Public Key Infrastructure on the Blockchain. However, PB-PKI suff...
Revisiting Privacy-aware Blockchain Public Key Infrastructure
Blockchain Public Key Infrastructure Privacy
2019/5/21
Privacy-aware Blockchain Public Key Infrastructure (PB- PKI) is a recent proposal by Louise Axon (2017) to create a privacy-preserving Public Key Infrastructure on the Blockchain. However, PB-PKI suff...