Coin-Based Multi-party Fair Exchange (English)
- New search for: Kılınç Alper, Handan
- New search for: Küpçü, Alptekin
- New search for: Sako, Kazue
- New search for: Tippenhauer, Nils Ole
- Further information on Tippenhauer, Nils Ole:
- https://orcid.org/https://orcid.org/0000-0001-8424-2602
- New search for: Kılınç Alper, Handan
- New search for: Küpçü, Alptekin
In:
Applied Cryptography and Network Security
: 19th International Conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021, Proceedings, Part I
;
Chapter: 6
;
130-160
;
2021
- Article/Chapter (Book) / Electronic Resource
-
Title:Coin-Based Multi-party Fair Exchange
-
Additional title:Lect.Notes Computer
-
Contributors:Sako, Kazue ( editor ) / Tippenhauer, Nils Ole ( editor ) / Kılınç Alper, Handan ( author ) / Küpçü, Alptekin ( author )
-
Conference:International Conference on Applied Cryptography and Network Security ; 2021 ; Kamakura, Japan
-
Published in:Applied Cryptography and Network Security : 19th International Conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021, Proceedings, Part I ; Chapter: 6 ; 130-160Lecture Notes in Computer Science ; 12726 ; 130-160Security and Cryptology ; 130-160
-
Publisher:
- New search for: Springer International Publishing
-
Place of publication:Cham
-
Publication date:2021-06-09
-
Size:31 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Adaptive-ID Secure Hierarchical ID-Based Authenticated Key Exchange Under Standard Assumptions Without Random OraclesIshibashi, Ren / Yoneyama, Kazuki et al. | 2021
- 2
-
Analysis of Client-Side Security for Long-Term Time-Stamping ServicesMeng, Long / Chen, Liqun et al. | 2021
- 3
-
Towards Efficient and Strong Backward Private Searchable Encryption with Secure EnclavesVo, Viet / Lai, Shangqi / Yuan, Xingliang / Nepal, Surya / Liu, Joseph K. et al. | 2021
- 4
-
CECMLP: New Cipher-Based Evaluating Collaborative Multi-layer Perceptron Scheme in Federated LearningChen, Yuqi / Zhang, Xiaoyu / Xie, Yi / Miao, Meixia / Ma, Xu et al. | 2021
- 5
-
Blind Polynomial Evaluation and Data TradingLiu, Yi / Wang, Qi / Yiu, Siu-Ming et al. | 2021
- 6
-
Coin-Based Multi-party Fair ExchangeKılınç Alper, Handan / Küpçü, Alptekin et al. | 2021
- 7
-
P2DEX: Privacy-Preserving Decentralized Cryptocurrency ExchangeBaum, Carsten / David, Bernardo / Frederiksen, Tore Kasper et al. | 2021
- 8
-
\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\text{ W-OTS}^{+}$$\end{document} Up My Sleeve! A Hidden Secure Fallback for Cryptocurrency WalletsChaum, David / Larangeira, Mario / Yaksetig, Mario / Carter, William et al. | 2021
- 9
-
Terrorist Attacks for Fake Exposure Notifications in Contact Tracing SystemsAvitabile, Gennaro / Friolo, Daniele / Visconti, Ivan et al. | 2021
- 10
-
Unlinkable and Invisible \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\gamma $$\end{document}-Sanitizable SignaturesBossuat, Angèle / Bultel, Xavier et al. | 2021
- 11
-
Partially Structure-Preserving Signatures: Lower Bounds, Constructions and MoreGhadafi, Essam et al. | 2021
- 12
-
An Efficient Certificate-Based Signature Scheme in the Standard ModelWang, Guoqiang / Cao, Yanmei et al. | 2021
- 13
-
SnakeGX: A Sneaky Attack Against SGX EnclavesToffalini, Flavio / Graziano, Mariano / Conti, Mauro / Zhou, Jianying et al. | 2021
- 14
-
Telepathic Headache: Mitigating Cache Side-Channel Attacks on Convolutional Neural NetworksChabanne, Hervé / Danger, Jean-Luc / Guiga, Linda / Kühne, Ulrich et al. | 2021
- 15
-
Efficient FPGA Design of Exception-Free Generic Elliptic Curve CryptosystemsTanaka, Kiyofumi / Miyaji, Atsuko / Jin, Yaoan et al. | 2021
- 16
-
Access Control Encryption from Group EncryptionWang, Xiuhua / Wong, Harry W. H. / Chow, Sherman S. M. et al. | 2021
- 17
-
Password Protected Secret Sharing from LatticesRoy, Partha Sarathi / Dutta, Sabyasachi / Susilo, Willy / Safavi-Naini, Reihaneh et al. | 2021
- 18
-
Efficient Homomorphic Conversion Between (Ring) LWE CiphertextsChen, Hao / Dai, Wei / Kim, Miran / Song, Yongsoo et al. | 2021