Building Blockchains with Secure and Practical Public-Key Cryptographic Algorithms: Background, Motivations and Example.
Ke HuangYi MuFatemeh RezaeibaghaXiaosong ZhangTing ChenPublished in: IEEE Netw. (2021)
Keyphrases
- cryptographic algorithms
- elliptic curve cryptography
- public key
- security analysis
- public key cryptography
- public key infrastructure
- authentication scheme
- digital signature
- private key
- security model
- diffie hellman
- elliptic curve
- authentication protocol
- public key encryption
- signature scheme
- security protocols
- high security
- encryption scheme
- secret key
- secure communication
- error correction
- provably secure
- privacy preserving
- security properties
- key management
- digital watermark
- application development