2018
DOI: 10.1109/access.2017.2788411
|View full text |Cite
|
Sign up to set email alerts
|

An Anti-Quantum Transaction Authentication Approach in Blockchain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
53
0
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 108 publications
(58 citation statements)
references
References 15 publications
0
53
0
1
Order By: Relevance
“…• Sybil attack: Under this attack, an adversary creates many fake identities. By performing many interactions in the network, the adversary can gain a large influence within Replay attack [39], [10] Impersonation attack [13], [39], [10] Sybil attack [40] False data injection attack [21] Tampering attack [41] Overlay attack [41] Modification attack [39], [10] Man-in-the-middle attack [39], [10] Quantum attack [43] Hiding Blocks attack [40] Whitewashing [40] DDoS/DoS attack [36], [37], [38], [39] Refusal to Sign attack [40] Double-spending attack [41], [22] Collusion attack [42] the community, i.e, increasing/decreasing the reputation of some agents. TrustChain [40] addresses this issue by creating an immutable chain of temporally ordered interactions for each agent.…”
Section: A Identity-based Attacksmentioning
confidence: 99%
See 3 more Smart Citations
“…• Sybil attack: Under this attack, an adversary creates many fake identities. By performing many interactions in the network, the adversary can gain a large influence within Replay attack [39], [10] Impersonation attack [13], [39], [10] Sybil attack [40] False data injection attack [21] Tampering attack [41] Overlay attack [41] Modification attack [39], [10] Man-in-the-middle attack [39], [10] Quantum attack [43] Hiding Blocks attack [40] Whitewashing [40] DDoS/DoS attack [36], [37], [38], [39] Refusal to Sign attack [40] Double-spending attack [41], [22] Collusion attack [42] the community, i.e, increasing/decreasing the reputation of some agents. TrustChain [40] addresses this issue by creating an immutable chain of temporally ordered interactions for each agent.…”
Section: A Identity-based Attacksmentioning
confidence: 99%
“…They aim to break the cryptographic algorithm and expose its keys. In [43] the quantum attack is investigated in blockchain. This attack is designed to solve the elliptic curve digital logarithm, i.e., derive the private key from the elliptic curve public key.…”
Section: Cryptanalytic Attacksmentioning
confidence: 99%
See 2 more Smart Citations
“…No countermeasure is found for Replay attack. In order to overcome the Quantum computing threats, Yin et al [39] implement the lattice cryptography and in [6] authors suggest an additional digital signature or a hard fork in the post-quantum era. Decusatis et al [11] propose a need of quantum blockchain.…”
Section: Countermeasuresmentioning
confidence: 99%