2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) 2021
DOI: 10.1109/trustcom53373.2021.00162
|View full text |Cite
|
Sign up to set email alerts
|

EDKSAP : Efficient Double-Key Stealth Address Protocol in Blockchain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…Todd [2] 2014 ECDH One Yes Yes Monero [3] 2014 ECDH + DKSAP Two Yes Yes Courtois and Mercer [13] 2017 ECDH + DKSAP with multiple key pairs Multiple Yes Yes Fan [14] 2018 ECDH + DKSAP with improved parsing Two Yes Yes Fan et al [7] 2019 Bilinear Mapping One No N/A Liu et al [8] 2019 Lattice-based SAP Two No N/A Feng et al [15] 2020 ECDH + DKSAP with improved parsing Two No N/A Lee and Song [16] 2021 ECDH One Yes Yes Feng et al [5] 2021 Bilinear Mapping Two Yes Yes Mohideen and Kumar [17] 2022 ECDH + DKSAP with improved parsing Two No N/A…”
Section: One Yes Yesmentioning
confidence: 99%
See 1 more Smart Citation
“…Todd [2] 2014 ECDH One Yes Yes Monero [3] 2014 ECDH + DKSAP Two Yes Yes Courtois and Mercer [13] 2017 ECDH + DKSAP with multiple key pairs Multiple Yes Yes Fan [14] 2018 ECDH + DKSAP with improved parsing Two Yes Yes Fan et al [7] 2019 Bilinear Mapping One No N/A Liu et al [8] 2019 Lattice-based SAP Two No N/A Feng et al [15] 2020 ECDH + DKSAP with improved parsing Two No N/A Lee and Song [16] 2021 ECDH One Yes Yes Feng et al [5] 2021 Bilinear Mapping Two Yes Yes Mohideen and Kumar [17] 2022 ECDH + DKSAP with improved parsing Two No N/A…”
Section: One Yes Yesmentioning
confidence: 99%
“…We designed BaseSAP to be fully extendable, thereby enabling the creation of unique SAPs based on particular cryptographic schemes on top of it. Examples of such extensions include stealth addresses derived from the Secp256k1 elliptic curve, SAPs based on elliptic curve pairings [5]- [7] or generated using lattice-based cryptography [8], [9]. The protocol design ensures compatibility and proactively accommodates future quantum-resistant cryptographic schemes that require larger key sizes.…”
Section: Introductionmentioning
confidence: 99%