National Repository of Grey Literature 4 records found  Search took 0.00 seconds. 
Deployment of Threshold Signatures for Securing Bitcoin Transactions
Tran, Minh ; Dzurenda, Petr
Blockchain technology, especially Bitcoin, has revolutionizedhow we think about and manage financial transactions.However, with the increasing demand and usage of blockchaintechnology, the security of cryptocurrency wallets has become acritical concern. Threshold signatures offer a promising solutionto this problem, allowing multiple parties to sign a transactionwithout revealing their private keys. This article presents an Androidmobile Bitcoin wallet application that uses Schnorr-basedthreshold signatures. The application also deploys smartwatchintegration for enhanced security and usability. This integrationprovides an additional layer of security by requiring physicalconfirmation from the user before approving any transaction.Our implementation provides a secure and efficient platform formanaging Bitcoin assets using threshold signatures while alsoproviding an intuitive and easy-to-use interface for interactingwith the application.
Advanced security for blockchain transactions
Tran, Minh ; Člupek, Vlastimil (referee) ; Dzurenda, Petr (advisor)
Blockchain technology, especially Bitcoin, has revolutionized how we think about and manage financial transactions. However, with the increasing demand and usage of blockchain technology, the security of cryptocurrency wallets has become a critical concern. Threshold signatures offer a promising solution to this problem, allowing multiple parties to sign a transaction without revealing their private keys. This article presents an Android mobile Bitcoin wallet application that uses Schnorr-based threshold signatures. The application also deploys smartwatch integration for enhanced security and usability. This integration provides an additional layer of security by requiring physical confirmation from the user before approving any transaction. Our implementation provides a secure and efficient platform for managing Bitcoin assets using threshold signatures while also providing an intuitive and easy-to-use interface for interacting with the application.
Paillier Cryptosystem Optimisations for Homomorphic Computation.
Ryšavá, P. ; Ricci, S.
Homomorphic encryptions can ensure privacy in systems operating with sensitive data. It also allows outsourcing the data processing without the need to disclose the information within. To keep good performance over the growing mass of data, the execution of homomorphic schemes has to be efficient. In this article, we focus on the optimization of the Paillier scheme. This scheme allows the addition of a constant or another ciphertext without decryption of the encrypted values. Since the exponentiation used in the encryption process is time-consuming, we have implemented noise and message pre-computation to avoid time-demanding operations. These adjustments significantly fasten the encryption process, especially using the noise pre-computation.
Audiovisual cryptography
Zpěváček, Marek ; Tůma, Jiří (advisor) ; Boháček, Milan (referee)
This work examines the visual cryptography, which was introduced in 1995 by Moni Naor and Adi Shamir. It is a cryptosystem which allows us to share a secret among many users and reconstruction of secret can be done by human visual system only. Firstly, the relevant notations are defined and related theorems are proved. Additionally, some basic schemes and a general (k, k)-scheme are described. Main part of this work consists of an algorithm for creating general (k, n)-scheme. For every scheme, we prove its security and reconstruction correctness. Finally, we briefly mention a few possible extensions. Powered by TCPDF (www.tcpdf.org)

Interested in being notified about new results for this query?
Subscribe to the RSS feed.