2018
DOI: 10.1007/978-3-030-03638-6_9
|View full text |Cite
|
Sign up to set email alerts
|

A Blockchain-Assisted Hash-Based Signature Scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 32 publications
0
3
0
Order By: Relevance
“…In the application, Even and Goldreich proposed an on-line/off-line signature scheme (Even et al 1996), which uses the efficient OTS scheme for the on-line signing, along with an ordinary signature scheme used for the off-line phase. Other applications such as TESLA (Perrig et al 2002), wireless security, etc., are also well researched (Perrig et al 2001;Bergadano et al 2002;Buldas et al 2017Buldas et al , 2018.…”
Section: Related Workmentioning
confidence: 99%
“…In the application, Even and Goldreich proposed an on-line/off-line signature scheme (Even et al 1996), which uses the efficient OTS scheme for the on-line signing, along with an ordinary signature scheme used for the off-line phase. Other applications such as TESLA (Perrig et al 2002), wireless security, etc., are also well researched (Perrig et al 2001;Bergadano et al 2002;Buldas et al 2017Buldas et al , 2018.…”
Section: Related Workmentioning
confidence: 99%
“…Subsequent minor transactions are connected to Tx p,0 via the hash function. Throughout the transaction, the security of each minor transaction hinges on the challenge of calculating the hash inverse function [14]. The concept of the hash chain is illustrated in Figure 1.…”
Section: Hash Function and Hash Chainmentioning
confidence: 99%
“…In 2018, Buldas et al presented a hash-based server-supported digital signature scheme. They suggested that the concept of blockchain authenticated data structures, and they presented a blockchain design that could have independent values [34]. The fresh signatures' keys are generated by supporting the server using a hash tree and a hash chain.…”
Section: Blockchain-based Protocolsmentioning
confidence: 99%
“…However, according to the protocols discussed in Section 2.2, in most blockchain-based protocols, some entities handle systems. To name a few examples, we can mention those called Server (see [34], Page 5), Verifier (see [17], Page 6), IDM (see [18], Page 2), and Authority (see [37], Page 4). Therefore, it is required that, in addition to the blockchain as the distributed database, there needs to be an entity for initialing the QS-RP, verifying the received proofs, and assigning and sending the whistleblower's reward.…”
Section: Network Modelmentioning
confidence: 99%