Mempool Privacy via Batched Threshold Encryption: Attacks and Defenses.
Arka Rai ChoudhuriSanjam GargJulien PietGuru-Vamsi PolicharlaPublished in: IACR Cryptol. ePrint Arch. (2024)
Keyphrases
- security risks
- cryptographic protocols
- security properties
- denial of service attacks
- data publishing
- network security
- security mechanisms
- denial of service
- security protocols
- dos attacks
- privacy preserving
- security threats
- stream cipher
- security issues
- countermeasures
- protection mechanisms
- cryptographic algorithms
- secret key
- personal information
- privacy preservation
- digital signature
- block cipher
- advanced encryption standard
- mutual authentication
- biometric template
- information security
- data confidentiality
- data protection
- encryption algorithms
- privacy preserving data mining
- information loss
- private information
- authentication protocol
- privacy protection
- information leakage
- personal data
- key management
- intrusion detection
- watermarking scheme
- network layer
- standard model
- differential privacy
- data privacy
- resource constrained
- sensitive data
- sensitive information
- hash functions
- network traffic
- lightweight