IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) 2020
DOI: 10.1109/infocomwkshps50562.2020.9163025
|View full text |Cite
|
Sign up to set email alerts
|

Gemini-Chain: A Regulatable Digital Currency Model based on Blockchain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 9 publications
0
6
0
Order By: Relevance
“…Unfortunately, this method is susceptible to de-synchronization attacks and replay attacks [63]. On the other hand, auditable pseudonym based authentication schemes are developed in [64], [65], [66], [67], [68], [69], [70], [71] to enhance user anonymity. On the flip-side, the scheme in [64] relies on TA while the technique in [65] requires a trusted third party (TTP) to store all the users' private keys.…”
Section: Security Schemes For Cloud Environmentmentioning
confidence: 99%
See 2 more Smart Citations
“…Unfortunately, this method is susceptible to de-synchronization attacks and replay attacks [63]. On the other hand, auditable pseudonym based authentication schemes are developed in [64], [65], [66], [67], [68], [69], [70], [71] to enhance user anonymity. On the flip-side, the scheme in [64] relies on TA while the technique in [65] requires a trusted third party (TTP) to store all the users' private keys.…”
Section: Security Schemes For Cloud Environmentmentioning
confidence: 99%
“…This renders it vulnerable to attacks such as user impersonation and key tampering. On its part, the protocol in [67] employs consortium blockchain which makes it inefficient [72]. Similarly, the conditional privacy based scheme in [69] offers anonymous authentication with the cloud service provider but at the expense of increased overheads.…”
Section: Security Schemes For Cloud Environmentmentioning
confidence: 99%
See 1 more Smart Citation
“…Sun et al proposed a multi-chain model suitable for central bank-supervised digital currencies, but the communication between chain nodes is more complicated, and the design of super chain makes it lose decentralized characteristics and cannot guarantee the privacy of transactions [22]. Zhang et al proposed a digital currency supervision model with a double-chain structure, anchoring the alliance chain on a public chain [23]. As a consensus participant, the alliance chain guarantees the privacy of transactions through secret sharing, and provides the characteristics of supervision, while ensuring the decentralization and anonymity of digital currencies.…”
Section: Related Workmentioning
confidence: 99%
“…Literature [22] proposed a multi-chain model suitable for supervision, but the communication between chain nodes is more complicated, and the super chain structure also makes it lose the decentralization characteristics and cannot protect the privacy of transactions. Literature [23] proposed a digital currency supervision model that adopts a double-chain structure, which combines alliance chains and public chains to ensure the privacy of transactions through secret sharing, while providing regulatable features, but the realization of the double-chain structure is more complicated. Both the model and the method proposed in this article are used to improve the privacy protection and supervision of blockchain transactions, which allows them to obtain basically satisfactory results.…”
Section: Comparison and Analysismentioning
confidence: 99%