A Private Key Management Scheme on Blockchain Against Collusion Attacks
To address the security of the recovery of lost private keys on the blockchain,this paper proposes a distributed management scheme for private keys based on threshold secret sharing.The scheme combines the user’s private key with the secret password as a secret and uses the threshold key mechanism t...
| Published in: | Jisuanji gongcheng |
|---|---|
| Main Author: | ZHOU Jian, QU Ran |
| Format: | Article |
| Language: | English |
| Published: |
Editorial Office of Computer Engineering
2020-11-01
|
| Subjects: | |
| Online Access: | https://www.ecice06.com/fileup/1000-3428/PDF/20201103.pdf |
Similar Items
Blockchain-based high transparent PKI authentication protocol
by: Liquan CHEN, et al.
Published: (2022-08-01)
by: Liquan CHEN, et al.
Published: (2022-08-01)
Reminisce: Blockchain Private Key Generation and Recovery Using Distinctive Pictures-Based Personal Memory
by: Jungwon Seo, et al.
Published: (2022-06-01)
by: Jungwon Seo, et al.
Published: (2022-06-01)
Key management scheme with private key self-healing ability in DTN
by: De-quan LI, et al.
Published: (2017-04-01)
by: De-quan LI, et al.
Published: (2017-04-01)
Quantum secured blockchain framework for enhancing post quantum data security
by: Nalavala Ramanjaneya Reddy, et al.
Published: (2025-08-01)
by: Nalavala Ramanjaneya Reddy, et al.
Published: (2025-08-01)
PKI cross-domain authentication scheme based on advanced PBFT algorithm
by: Sijie QIAN, et al.
Published: (2020-08-01)
by: Sijie QIAN, et al.
Published: (2020-08-01)
A biometrics-generated private/public key cryptography for a blockchain-based e-voting system
by: Jide Kehinde Adeniyi, et al.
Published: (2024-03-01)
by: Jide Kehinde Adeniyi, et al.
Published: (2024-03-01)
Cooperative Jamming-Based Physical-Layer Group Secret and Private Key Generation
by: Shiming Fu, et al.
Published: (2024-09-01)
by: Shiming Fu, et al.
Published: (2024-09-01)
Blockchain-based key management scheme for distributed networks
by: Qianyi DAI, et al.
Published: (2018-09-01)
by: Qianyi DAI, et al.
Published: (2018-09-01)
On distilling secure key from reducible private states and (non)existence of entangled key-undistillable states
by: K Horodecki, et al.
Published: (2018-01-01)
by: K Horodecki, et al.
Published: (2018-01-01)
Multi-factor Blockchain Private Key Protection Scheme Based on Secret Sharing
by: XIAO Jian, YANG Min
Published: (2023-06-01)
by: XIAO Jian, YANG Min
Published: (2023-06-01)
A Lightweight Certificateless Group Key Agreement Method without Pairing Based on Blockchain for Smart Grid
by: Zhihao Wang, et al.
Published: (2022-04-01)
by: Zhihao Wang, et al.
Published: (2022-04-01)
The Modification of pBFT Algorithm to Increase Network Operations Efficiency in Private Blockchains
by: Youn-A Min
Published: (2021-07-01)
by: Youn-A Min
Published: (2021-07-01)
KeyScrub: A Reliable Key Backup and Recovery Method for Blockchain
by: Woochang Jeong, et al.
Published: (2023-01-01)
by: Woochang Jeong, et al.
Published: (2023-01-01)
An improved signature model of multivariate polynomial public key cryptosystem against key recovery attack
by: Xin Wang, et al.
Published: (2019-08-01)
by: Xin Wang, et al.
Published: (2019-08-01)
Blockchain Technology – Support for Collaborative Systems
by: Gheorghe MATEI
Published: (2020-01-01)
by: Gheorghe MATEI
Published: (2020-01-01)
Asynchronous distribution scheme of group quantum keys based on max heap in classical network
by: Dexin Zhu, et al.
Published: (2025-06-01)
by: Dexin Zhu, et al.
Published: (2025-06-01)
New key management scheme of wireless sensor networks based on key relation table
by: HUANG Hai-ping1, et al.
Published: (2006-01-01)
by: HUANG Hai-ping1, et al.
Published: (2006-01-01)
New key management scheme of wireless sensor networks based on key relation table
by: HUANG Hai-ping1, et al.
Published: (2006-01-01)
by: HUANG Hai-ping1, et al.
Published: (2006-01-01)
Public key searchable encryption scheme based on blockchain
by: Ruizhong DU, et al.
Published: (2020-04-01)
by: Ruizhong DU, et al.
Published: (2020-04-01)
Public key searchable encryption scheme based on blockchain
by: Ruizhong DU, et al.
Published: (2020-04-01)
by: Ruizhong DU, et al.
Published: (2020-04-01)
Blockchain-Based Information Sharing Security for the Internet of Things
by: Abdullah Aljumah, et al.
Published: (2023-05-01)
by: Abdullah Aljumah, et al.
Published: (2023-05-01)
Private Key and Group Key Generation Using Correlated Sources and Wiretap Broadcast Channel in Presence of One-Way Public Communication
by: Shixun Gong, et al.
Published: (2019-01-01)
by: Shixun Gong, et al.
Published: (2019-01-01)
Provably secure private key protection scheme for smart mobile terminal
by: Jun MA, et al.
Published: (2012-12-01)
by: Jun MA, et al.
Published: (2012-12-01)
Provably secure private key protection scheme for smart mobile terminal
by: Jun MA, et al.
Published: (2012-12-01)
by: Jun MA, et al.
Published: (2012-12-01)
Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos
by: Mostafizar Rahman, et al.
Published: (2021-09-01)
by: Mostafizar Rahman, et al.
Published: (2021-09-01)
Escrow mechanism for personal security keys on IBE
by: ZOU Yue-peng1, et al.
Published: (2009-01-01)
by: ZOU Yue-peng1, et al.
Published: (2009-01-01)
Escrow mechanism for personal security keys on IBE
by: ZOU Yue-peng1, et al.
Published: (2009-01-01)
by: ZOU Yue-peng1, et al.
Published: (2009-01-01)
Anti-collusion multi-party private set union protocol in low-bandwidth scenarios
by: ZHANG En, et al.
Published: (2025-01-01)
by: ZHANG En, et al.
Published: (2025-01-01)
Storage system of power grid enterprise based on PBFT blockchain technology
by: Chunyan YANG, et al.
Published: (2021-02-01)
by: Chunyan YANG, et al.
Published: (2021-02-01)
Storage system of power grid enterprise based on PBFT blockchain technology
by: Chunyan YANG, et al.
Published: (2021-02-01)
by: Chunyan YANG, et al.
Published: (2021-02-01)
A Blockchain-Based Authentication and Dynamic Group Key Agreement Protocol
by: Zisang Xu, et al.
Published: (2020-08-01)
by: Zisang Xu, et al.
Published: (2020-08-01)
Cryptanalysis of some chaos-based keyed hash functions
by: ZHENG Shi-hui1, et al.
Published: (2011-01-01)
by: ZHENG Shi-hui1, et al.
Published: (2011-01-01)
Cryptanalysis of some chaos-based keyed hash functions
by: ZHENG Shi-hui1, et al.
Published: (2011-01-01)
by: ZHENG Shi-hui1, et al.
Published: (2011-01-01)
The key security management scheme of cloud storage based on blockchain and digital twins
by: Jie Huang, et al.
Published: (2024-01-01)
by: Jie Huang, et al.
Published: (2024-01-01)
Blockchain Enabled Anonymous Privacy-Preserving Authentication Scheme for Internet of Health Things
by: Arun Sekar Rajasekaran, et al.
Published: (2022-12-01)
by: Arun Sekar Rajasekaran, et al.
Published: (2022-12-01)
An Adaptive and Hierarchical Approach to Configure Sharding Committees in Blockchains
by: Mina Kimiaei, et al.
Published: (2024-01-01)
by: Mina Kimiaei, et al.
Published: (2024-01-01)
Security Analysis of Reusing Vinegar Values in UOV Signature Scheme
by: Namhun Koo, et al.
Published: (2024-01-01)
by: Namhun Koo, et al.
Published: (2024-01-01)
Secure Encapsulation Schemes Using Key Recovery System in IoMT Environments
by: Taehoon Kim, et al.
Published: (2021-05-01)
by: Taehoon Kim, et al.
Published: (2021-05-01)
Key storage management scheme based on keyed hash tree with state
by: Xiangyu WANG, et al.
Published: (2018-05-01)
by: Xiangyu WANG, et al.
Published: (2018-05-01)
Key storage management scheme based on keyed hash tree with state
by: Xiangyu WANG, et al.
Published: (2018-05-01)
by: Xiangyu WANG, et al.
Published: (2018-05-01)
Similar Items
-
Blockchain-based high transparent PKI authentication protocol
by: Liquan CHEN, et al.
Published: (2022-08-01) -
Reminisce: Blockchain Private Key Generation and Recovery Using Distinctive Pictures-Based Personal Memory
by: Jungwon Seo, et al.
Published: (2022-06-01) -
Key management scheme with private key self-healing ability in DTN
by: De-quan LI, et al.
Published: (2017-04-01) -
Quantum secured blockchain framework for enhancing post quantum data security
by: Nalavala Ramanjaneya Reddy, et al.
Published: (2025-08-01) -
PKI cross-domain authentication scheme based on advanced PBFT algorithm
by: Sijie QIAN, et al.
Published: (2020-08-01)
