메뉴 건너뛰기




Volumn 8438, Issue , 2014, Pages 122-139

Increasing anonymity in bitcoin

Author keywords

Aggregate signatures; Anonymity; Bitcoin; Cryptocurrency; Plausible deniability

Indexed keywords

CRYPTOGRAPHY; NETWORK SECURITY;

EID: 84910627417     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-662-44774-1_9     Document Type: Conference Paper
Times cited : (47)

References (25)
  • 4
    • 35248835575 scopus 로고    scopus 로고
    • Aggregate and verifiably encrypted signatures from bilinear maps
    • Biham, E. (ed.),,. Springer, Heidelberg
    • Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 416-432. Springer, Heidelberg (2003).
    • (2003) EUROCRYPT 2003. LNCS , vol.2656 , pp. 416-432
    • Boneh, D.1    Gentry, C.2    Lynn, B.3    Shacham, H.4
  • 5
    • 0344232849 scopus 로고    scopus 로고
    • Boneh et al. 's k-Element aggregate extraction assumption is equivalent to the diffie-hellman assumption
    • Laih, C.-S. (ed.),,. Springer, Heidelberg
    • Coron, J.-S., Naccache, D.: Boneh et al. 's k-Element aggregate extraction assumption is equivalent to the diffie-hellman assumption. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 392-397. Springer, Heidelberg (2003).
    • (2003) ASIACRYPT 2003. LNCS , vol.2894 , pp. 392-397
    • Coron, J.-S.1    Naccache, D.2
  • 6
    • 35048877778 scopus 로고    scopus 로고
    • Sequential aggregate signatures from trapdoor permutations
    • Cachin, C., Camenisch, J.L. (eds.),,. Springer, Heidelberg
    • Lysyanskaya, A., Micali, S., Reyzin, L., Shacham, H.: Sequential aggregate signatures from trapdoor permutations. In: Cachin, C., Camenisch, J. L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 74-90. Springer, Heidelberg (2004).
    • (2004) EUROCRYPT 2004. LNCS , vol.3027 , pp. 74-90
    • Lysyanskaya, A.1    Micali, S.2    Reyzin, L.3    Shacham, H.4
  • 10
    • 33746066354 scopus 로고    scopus 로고
    • Sequential aggregate signatures and multisignatures without random oracles
    • Vaudenay, S. (ed.),,. Springer, Heidelberg
    • Lu, S., Ostrovsky, R., Sahai, A., Shacham, H., Waters, B.: Sequential aggregate signatures and multisignatures without random oracles. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 465-485. Springer, Heidelberg (2006).
    • (2006) EUROCRYPT 2006. LNCS , vol.4004 , pp. 465-485
    • Lu, S.1    Ostrovsky, R.2    Sahai, A.3    Shacham, H.4    Waters, B.5
  • 11
    • 84866687048 scopus 로고    scopus 로고
    • History-free sequential aggregate signatures
    • Visconti, I., De Prisco, R. (eds.),,. Springer, Heidelberg
    • Fischlin, M., Lehmann, A., Schröder, D.: History-free sequential aggregate signatures. In: Visconti, I., De Prisco, R. (eds.) SCN 2012. LNCS, vol. 7485, pp. 113-130. Springer, Heidelberg (2012).
    • (2012) SCN 2012. LNCS , vol.7485 , pp. 113-130
    • Fischlin, M.1    Lehmann, A.2    Schröder, D.3
  • 12
    • 84871533747 scopus 로고    scopus 로고
    • Sequential aggregate signatures with lazy verification from trapdoor permutations
    • Wang, X., Sako, K. (eds.),,. Springer, Heidelberg
    • Brogle, K., Goldberg, S., Reyzin, L.: Sequential aggregate signatures with lazy verification from trapdoor permutations. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 644-662. Springer, Heidelberg (2012).
    • (2012) ASIACRYPT 2012. LNCS , vol.7658 , pp. 644-662
    • Brogle, K.1    Goldberg, S.2    Reyzin, L.3
  • 14
    • 84948142629 scopus 로고    scopus 로고
    • An analysis of anonymity in the bitcoin system
    • Altshuler, Y., Elovici, Y., Cremers, A.B., Aharony, N., Pentland, A. (eds.),. Springer, New York
    • Reid, F., Harrigan, M.: An analysis of anonymity in the bitcoin system. In: Altshuler, Y., Elovici, Y., Cremers, A. B., Aharony, N., Pentland, A. (eds.) Security and Privacy in Social Networks, pp. 197-223. Springer, New York (2013).
    • (2013) Security and Privacy in Social Networks , pp. 197-223
    • Reid, F.1    Harrigan, M.2
  • 18
    • 12244265523 scopus 로고    scopus 로고
    • Where are the hard knapsack problems
    • Pisinger, D.: Where are the hard knapsack problems. Comput. Oper. Res. 32, 2271-2284 (2005).
    • (2005) Comput. Oper. Res , vol.32 , pp. 2271-2284
    • Pisinger, D.1
  • 19
    • 0009625877 scopus 로고
    • Hard knapsack problems
    • Chvatal, V.: Hard knapsack problems. Oper. Res. 28(6), 1402-1411 (1980).
    • (1980) Oper. Res , vol.28 , Issue.6 , pp. 1402-1411
    • Chvatal, V.1
  • 20
    • 38749089099 scopus 로고    scopus 로고
    • Generalized compact knapsacks, cyclic lattices, and efficient oneway functions
    • (Prelim. In: FOCS 2002)
    • Micciancio, D.: Generalized compact knapsacks, cyclic lattices, and efficient oneway functions. Comput. Complex. 16(4), 365-411 (2007). (Prelim. In: FOCS 2002).
    • (2007) Comput. Complex , vol.16 , Issue.4 , pp. 365-411
    • Micciancio, D.1
  • 21
    • 22144445920 scopus 로고    scopus 로고
    • The Weil pairing, and its efficient calculation
    • Miller, V. S.: The Weil pairing, and its efficient calculation. J. Cryptology 17(4), 235-261 (2004).
    • (2004) J. Cryptology , vol.17 , Issue.4 , pp. 235-261
    • Miller, V.S.1
  • 22
    • 84893081295 scopus 로고    scopus 로고
    • The tate-lichtenbaum pairing on a hyperelliptic curve via hyperelliptic nets
    • Abdalla, M., Lange, T. (eds.),,. Springer, Heidelberg
    • Uchida, Y., Uchiyama, S.: The tate-lichtenbaum pairing on a hyperelliptic curve via hyperelliptic nets. In: Abdalla, M., Lange, T. (eds.) Pairing 2012. LNCS, vol. 7708, pp. 218-233. Springer, Heidelberg (2013).
    • (2013) Pairing 2012. LNCS , vol.7708 , pp. 218-233
    • Uchida, Y.1    Uchiyama, S.2
  • 25
    • 34548111023 scopus 로고    scopus 로고
    • Scaling security in pairing-based protocols
    • Scott, M.: Scaling security in pairing-based protocols. IACR Cryptology ePrint Archive 2005, 139 (2005).
    • (2005) IACR Cryptology ePrint Archive , vol.2005 , pp. 139
    • Scott, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.