Secure Hierarchical Deterministic Wallet Supporting Stealth Address
- 25 September 2022
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC
Abstract
No abstract availableKeywords
This publication has 13 references indexed in Scilit:
- Secure hierarchical Bitcoin wallet scheme against privilege escalation attacksInternational Journal of Information Security, 2019
- A Formal Treatment of Deterministic WalletsPublished by Association for Computing Machinery (ACM) ,2019
- Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public KeyPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2019
- Secure Hierarchical Bitcoin Wallet Scheme Against Privilege Escalation AttacksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2018
- Ring Confidential TransactionsLedger, 2016
- Hierarchical Deterministic Bitcoin Wallets that Tolerate Key LeakagePublished by Springer Science and Business Media LLC ,2015
- Efficient Identity-Based Encryption Without Random OraclesLecture Notes in Computer Science, 2005
- Hierarchical Identity Based Encryption with Constant Size CiphertextLecture Notes in Computer Science, 2005
- Identity-Based Encryption from the Weil PairingLecture Notes in Computer Science, 2001
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978