Sharding-Based Proof-of-Stake Blockchain Protocols: Security Analysis.
Abdelatif HafidAbdelhakim Senhaji HafidAdil SenhajiPublished in: CoRR (2021)
Keyphrases
- security analysis
- authentication protocol
- key exchange
- security properties
- mutual authentication
- secure electronic
- smart card
- security requirements
- public key
- security model
- high security
- encryption scheme
- authentication scheme
- image encryption
- encryption algorithm
- user authentication
- cryptographic protocols
- elliptic curve cryptography
- secret key
- databases