搜索结果: 1-6 共查到“军队指挥学 Wallets”相关记录6条 . 查询时间(0.033 秒)
In cryptocurrencies such as Bitcoin or Ethereum users control funds via secret keys. To transfer funds from one user to another, the owner of the money signs a new transaction that transfers the funds...
Lattice RingCT v2.0 with Multiple Input and Output Wallets
Cryptocurrencies Lattice-Based Cryptography Post-Quantum Cryptography
2019/5/28
This paper presents the Lattice-based Ring Confidential Transactions (Lattice RingCT v2.0) protocol. Unlike the previous Lattice RingCT v1.0 (LRCT v1.0) protocol, the new protocol supports Multiple-In...
Side-channel attacks rely on the fact that the physical behavior of a device depends on the data it manipulates. We show in this paper how to use this class of attacks to break the security of some cr...
Bitcoin, being the most successful cryptocurrency, has been repeatedly attacked with many users losing their funds. The industry's response to securing the user's assets is to offer tamper-resistant h...
Minimizing Trust in Hardware Wallets with Two Factor Signatures
digital signatures threshold cryptography
2019/1/9
We introduce the notion of two-factor signatures (2FS), a generalization of a two-out-of-two threshold signature scheme in which one of the parties is a hardware token which can store a high-entropy s...
A Bitcoin wallet is a set of private keys known to a user and
which allow that user to spend any Bitcoin associated with those keys. In
a hierarchical deterministic (HD) wallet, child private keys a...