2020
DOI: 10.32604/cmc.2020.011293
|View full text |Cite
|
Sign up to set email alerts
|

A Key Recovery System Based on Password-protected Secret Sharing in a Permissioned Blockchain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(9 citation statements)
references
References 7 publications
0
9
0
Order By: Relevance
“…e transaction details of a block are contained in the header in the hexagonal value known as Merkle Root. Blockchain utilizes the hash function to perform cryptography [17].…”
Section: Enhanced Securitymentioning
confidence: 99%
“…e transaction details of a block are contained in the header in the hexagonal value known as Merkle Root. Blockchain utilizes the hash function to perform cryptography [17].…”
Section: Enhanced Securitymentioning
confidence: 99%
“…In a private blockchain, only selected participants who have permission can access the blockchain. 61 Moreover, the network is maintained by a central authority, and hence, it not decentralized in nature. 3.…”
Section: F I G U R E 2 Propagation Of a Transaction Using Blockchainmentioning
confidence: 99%
“…Abrading and termination pay might be contemplated as dual different practices can directly expand the cloud systems' user-friendliness and flexibility. In addition, some more block-chain and cloud related work can be read and referred to the references [20,[31][32][33][34][35][36][37][38][39]43,44]. The CPABE practice leads to several key problems when installed at cloud consumer's information interchange policy construction.…”
Section: Related Workmentioning
confidence: 99%
“…Block chain based QKD uses numerous internetwork communication links, which are a combination of secure quantum link and a general user info link [19,24,[36][37][38][39]. The source and destination together get a randomized pair of values on any place of G-bilinear cyclical group by adding cubits which are generated via different polarizers.…”
Section: Chaotic Key Making With Bqkdmentioning
confidence: 99%
See 1 more Smart Citation