ログイン 新規登録
言語:

WEKO3

  • トップ
  • ランキング
To
lat lon distance
To

Field does not validate



インデックスリンク

インデックスツリー

メールアドレスを入力してください。

WEKO

One fine body…

WEKO

One fine body…

アイテム

  1. シンポジウム
  2. シンポジウムシリーズ
  3. コンピュータセキュリティシンポジウム
  4. 2023

On Proof of Ownership in Digital Wallets

https://ipsj.ixsq.nii.ac.jp/records/228765
https://ipsj.ixsq.nii.ac.jp/records/228765
e79f54b5-a690-4af1-a5fa-0c5f59fa8eec
名前 / ファイル ライセンス アクション
IPSJ-CSS2023152.pdf IPSJ-CSS2023152.pdf (198.7 kB)
 2025年10月23日からダウンロード可能です。
Copyright (c) 2023 by the Information Processing Society of Japan
非会員:¥660, IPSJ:学会員:¥330, CSEC:会員:¥0, SPT:会員:¥0, DLIB:会員:¥0
Item type Symposium(1)
公開日 2023-10-23
タイトル
タイトル On Proof of Ownership in Digital Wallets
タイトル
言語 en
タイトル On Proof of Ownership in Digital Wallets
言語
言語 eng
資源タイプ
資源タイプ識別子 http://purl.org/coar/resource_type/c_5794
資源タイプ conference paper
著者所属
Kanazawa University
著者所属
Kanazawa University
著者所属
Kanazawa University
著者所属(英)
en
Kanazawa University
著者所属(英)
en
Kanazawa University
著者所属(英)
en
Kanazawa University
著者名 Chen, Wang

× Chen, Wang

Chen, Wang

Search repository
Zi-Yuan, Liu

× Zi-Yuan, Liu

Zi-Yuan, Liu

Search repository
Masahiro, Mambo

× Masahiro, Mambo

Masahiro, Mambo

Search repository
著者名(英) Chen, Wang

× Chen, Wang

en Chen, Wang

Search repository
Zi-Yuan, Liu

× Zi-Yuan, Liu

en Zi-Yuan, Liu

Search repository
Masahiro, Mambo

× Masahiro, Mambo

en Masahiro, Mambo

Search repository
論文抄録(英)
内容記述タイプ Other
内容記述 With the widespread adoption and increasing application of blockchain technology, cryptocurrency wallets used in Bitcoin and Ethereum play a crucial role in facilitating decentralized asset management and secure transactions. However, the security of these wallets primarily relies on users’ private keys, without enough care about the risks of the private keys’ theft and exposure. To address this issue, Chaum et al. (ACNS’21) introduced the concept of “Proof of Ownership”, allowing users to prove their ownership of private keys en when they are exposed publicly in a decentralized environment. Up to now, several related studies have been continuously proposed. However, these schemes require to interactively generate proofs, which are not suitable for specific scenarios. In addition, the computational complexity required by these schemes remains considerable. In this paper, we present an efficient approach that can “non-interactively” generate proofs for the ownership of secret keys. In particular, our approach utilizes zero-knowledge proof as well as hash function to allow users to present multiple proofs. Compared with start-of-the-art schemes, due to the non-interactive property and high efficiency, our approaches are applicable to a broader range of real-world environments.
書誌情報 コンピュータセキュリティシンポジウム2023論文集

p. 1115-1120, 発行日 2023-10-23
出版者
言語 ja
出版者 情報処理学会
戻る
0
views
See details
Views

Versions

Ver.1 2025-01-19 11:43:41.255548
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Cite as

エクスポート

OAI-PMH
  • OAI-PMH JPCOAR
  • OAI-PMH DublinCore
  • OAI-PMH DDI
Other Formats
  • JSON
  • BIBTEX

Confirm


Powered by WEKO3


Powered by WEKO3