2020 IEEE/CIC International Conference on Communications in China (ICCC Workshops) 2020
DOI: 10.1109/icccworkshops49972.2020.9209929
|View full text |Cite
|
Sign up to set email alerts
|

PDKSAP : Perfected Double-Key Stealth Address Protocol without Temporary Key Leakage in Blockchain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(13 citation statements)
references
References 12 publications
0
13
0
Order By: Relevance
“…Feng et al [15] propose a SAP that does not require additional information to be published with every stealth address transaction, allowing such transactions to look like common blockchain transactions. The authors use the number of transactions between certain peers instead of generating a Diffie-Hellman secret for the stealth address generation process.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Feng et al [15] propose a SAP that does not require additional information to be published with every stealth address transaction, allowing such transactions to look like common blockchain transactions. The authors use the number of transactions between certain peers instead of generating a Diffie-Hellman secret for the stealth address generation process.…”
Section: Related Workmentioning
confidence: 99%
“…AbdulKader and Kumar [17] build on top of the protocol of [15] and use the transaction ID of the most recent P2P transaction between two entities instead of the number of transactions in the stealth address generation process. The authors argue that without the need to attach information to the stealth address transaction, related protocols become more censorship-resistant and lightweight.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Therefore, it is important for the SAP to have a well-defined approach to handling master key signatures and related security measures to ensure the continued safety and privacy of the system. In addition, the security model of PDPKS allows the adversary to corrupt the derived secret keys, which imposes a strong security requirement that is rarely targeted in subsequent stealth address protocols (Feng et al 2020;Yu 2020). There is still a lack of cryptographic formalization that should match the SAP usage in blockchain, and a security model capturing the basic security requirements of Monero-like SAPs and the stronger security proposed in PDPKS, respectively.…”
Section: Introductionmentioning
confidence: 99%