Recoverable Private Key Scheme for Consortium Blockchain Based on Verifiable Secret Sharing |
Li, Guojia
(School of Cyberspace Security, Hangzhou Dianzi University)
You, Lin (School of Cyberspace Security, Hangzhou Dianzi University) Hu, Gengran (School of Cyberspace Security, Hangzhou Dianzi University) Hu, Liqin (School of Cyberspace Security, Hangzhou Dianzi University) |
1 | C. Feng, K. Yu, A. K. Bashir, Y. D. Al-Otaibi, Y. Lu, S. Chen, D. Zhang, "Efficient and secure data sharing for 5G flying drones: a blockchain-enabled approach," IEEE Network, vol. 35, no. 1, pp. 130-137. Feb. 2021. DOI |
2 | M. Guri, "Beatcoin: Leaking private keys from air-gapped cryptocurrency wallets," in Proc. of the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, NS, Canada, pp. 1308-1316, Aug. 2018. |
3 | N. Z. Aitzhan and D. Svetinovic, "Security and privacy in decentralized energy trading through multi-signatures, blockchain and anonymous messaging streams," IEEE Transactions on Dependable and Secure Computing, vol. 15, no. 5, pp. 840-852, Oct. 2018. DOI |
4 | D. Khovratovich and J. Law, "BIP32-Ed25519: Hierarchical Deterministic Keys over a Non-linear Keyspace," in Proc. of the 2017 IEEE European Symposium on Security and Privacy Workshops, Paris, pp. 27-31, Apr. 2017. |
5 | M. El Ghazouani, E. kiram, M. Ahmed, "Efficient Method Based on Blockchain Ensuring Data Integrity Auditing with Deduplication in Cloud," International Journal of Interactive Multimedia and Artificial Intelligence, vol. 6, no. 3, pp. 32-38. Sep. 2020. DOI |
6 | J. Zhou and R. Qu, "Study on the healing blockchain wallet protection mechanism against conspiracy attack," Computer Engineering, pp. 1-7, Apr. 2020. |
7 | F. Jurado, O. Delgado, A. Ortigosa, "Tracking News Stories Using Blockchain to Guarantee their Traceability and Information Analysis," International Journal of Interactive Multimedia and Artificial Intelligence, vol. 6, no. 3, pp. 39-46. Sep. 2020. DOI |
8 | M. Saez, "Blockchain-Enabled Platforms: Challenges and Recommendations," International Journal of Interactive Multimedia and Artificial Intelligence, vol. 6, no. 3 pp. 73-89. Sep. 2020. DOI |
9 | Y. Liu, R. Li, X. Liu, J. Wang, L. Zhang, C. Tang, and H. Kang, "An efficient method to enhance bitcoin wallet security," in Proc. of the 2017 11th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID), Xiamen. pp. 26-29, Oct. 2017. |
10 | S. Eskandari, J. Clark, D. Barrera, and E. Stobert, "A first look at the usability of bitcoin key management," in Proc. of NDSS Symposium 2015, 2015. |
11 | G. Gutoski and D. Stebila, "Hierarchical deterministic bitcoin wallets that tolerate key leakage," in Proc. of the International Conference on Financial Cryptography and Data Security, Springer, pp. 497-504, Jul. 2015. |
12 | A. Ouaddah, H. Mousannif, A. Abou Elkalam, and A. A. Ouahman, "Access control in the internet of things: Big challenges and new opportunities," Computer Networks, vol. 112, pp. 237-262, Jan. 2017. DOI |
13 | L. Harn and C.-F. Hsu, "Dynamic threshold secret reconstruction and its application to the threshold cryptography," Information Processing Letters, vol. 115, no. 11, pp. 851-857, Nov. 2015. DOI |
14 | H. N. Dai, Z. Zheng, and Y. Zhang, "Blockchain for internet of things: A survey," IEEE Internet of Things Journal, vol. 6, no. 5, pp. 8076-8094, Oct. 2019. DOI |
15 | A. Baldominos, JL. Lopez-Sanchez, M. Acevedo-Aguilar, "Blockverse: A Cloud Blockchain-based Platform for Tracking in Affiliate Systems," International Journal of Interactive Multimedia and Artificial Intelligence, vol. 6, no. 3. Jun. 2020. |
16 | N. K. shetri, "1 blockchain's roles in meeting key supply chain management objectives," International Journal of Information Management, vol. 39, pp. 80-89, Apr. 2018. DOI |
17 | G. Maxwell, A. Poelstra, Y. Seurin, and P. Wuille, "Simple schnorr multisignatures with applications to bitcoin," Designs, Codes and Cryptography, vol. 87, no. 9, pp. 2139-2164, Feb. 2019. DOI |
18 | D. Boneh, R. Gennaro, and S. Goldfeder, "Using level-1 homomorphic encryption to improve threshold dsa signatures for bitcoin wallet security," in Proc. of the International Conference on Cryptology and Information Security in Latin America, Springer, pp. 352-377, Jul. 2017. |
19 | P. Dikshit and K. Singh, "Efficient weighted threshold ecdsa for securing bitcoin wallet," in Proc. of the 2017 ISEA Asia Security and Privacy (ISEASP), Surat, pp. 1-9, Feb. 2017. |
20 | A. Shamir, "How to share a secret," Communications of the ACM, vol. 22, no. 11, pp. 612-613, Nov. 1979. DOI |
21 | H. S. Jennath, V. S. Anoop, S. Asharaf, "Blockchain for Healthcare: Securing Patient Data and Enabling Trusted Artificial Intelligence," International Journal of Interactive Multimedia and Artificial Intelligence, vol. 6, pp. 15-23. Dec. 2020. |
22 | S. Jamshidpour and Z. Ahmadian, "Security analysis of a dynamic threshold secret sharing scheme using linear subspace method," Information Processing Letters, vol. 163, p. 105994, Nov. 2020. DOI |
23 | N. Zhang, Y.L. Zang, and J. Tian, "The integration of biometrics and cryptography-a new solution for secure identity authentication," Journal of Cryptologic Research, vol. 2, no. 2, pp. 159-176, Apr. 2015. |
24 | J. Han, M. Song, H. Eom, Y. Son, "An efficient multi-signature wallet in blockchain using bloom filter," in Proc. of the 36th Annual ACM Symposium on Applied Computing, pp. 273-281. Mar. 2021. |
25 | Nakamoto Satoshi, "Bitcoin: A peer-to-peer electronic cash system," Manubot, Nov. 2019. |
26 | C. Esposito, M. Ficco, B. B. Gupta, "Blockchain-based authentication and authorization for smart city applications," Information Processing and Management, vol. 58, no. 2, pp. 102468, Mar. 2021. DOI |
27 | H. M. Kim, M. Laskowski, "Toward an ontology-driven blockchain design for supply-chain provenance," Intelligent Systems in Accounting, Finance and Management, vol. 25, no. 1, pp. 18-27, Mar. 2018. DOI |