Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Daniel Tschudi"'
Autor:
Morten Jokumsen, Torben Pryds Pedersen, Martin Schmidt Daugaard, Daniel Tschudi, Mikkel Wienberg Madsen, Thomas Wisbech
Publikováno v:
Energy Informatics, Vol 6, Iss S1, Pp 1-18 (2023)
Abstract We describe a solution for secure and verifiable handling of energy certificates. Such certificates are increasingly used to claim and prove responsible use of green energy, and there is a strong need for transparency and public verifiabilit
Externí odkaz:
https://doaj.org/article/3ca973fbb9a04628bf22fee7a0fcee60
Autor:
Chaya Ganesh, Yashvanth Kondi, Claudio Orlandi, Mahak Pancholi, Akira Takahashi, Daniel Tschudi
Publikováno v:
Advances in Cryptology – EUROCRYPT 2023 ISBN: 9783031306167
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::fe56327e874c6d09c1d0d5e00abf7a4a
https://doi.org/10.1007/978-3-031-30617-4_11
https://doi.org/10.1007/978-3-031-30617-4_11
Publikováno v:
Advances in Cryptology – EUROCRYPT 2022 ISBN: 9783031070846
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::96e43b92e6695540d11b233e3de521a9
https://doi.org/10.1007/978-3-031-07085-3_14
https://doi.org/10.1007/978-3-031-07085-3_14
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030939434
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ea01022e946f88e978a3e6f104336c6c
https://doi.org/10.1007/978-3-030-93944-1_12
https://doi.org/10.1007/978-3-030-93944-1_12
Publikováno v:
Financial Cryptography and Data Security ISBN: 9783662643303
Financial Cryptography (2)
Financial Cryptography (2)
Although blockchains aim for immutability as their core feature, several instances have exposed the harms with perfect immutability. The permanence of illicit content inserted in Bitcoin poses a challenge to law enforcement agencies like Interpol, an
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ccc185570b25ab23f8c6bd4e0b7be7c3
https://doi.org/10.1007/978-3-662-64331-0_2
https://doi.org/10.1007/978-3-662-64331-0_2
Autor:
Daniel Tschudi, Søren Eller Thomsen, Simon Holmgaard Kamp, Jesper Buus Nielsen, Bernardo Magri, Christian Matt
Publikováno v:
Progress in Cryptology – LATINCRYPT 2021 ISBN: 9783030882372
LATINCRYPT
LATINCRYPT
We propose a framework for building Nakamoto-style proof-of-work blockchains where blocks are treated differently in the “longest chain rule”. The crucial parameter is a weight function assigning different weights to blocks according to their has
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b83d9a07776253f957c9f72a7d6fc4cf
https://doi.org/10.1007/978-3-030-88238-9_15
https://doi.org/10.1007/978-3-030-88238-9_15
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030453879
Public Key Cryptography (2)
Public Key Cryptography (2)
Topology-Hiding Computation (THC) allows a set of parties to securely compute a function over an incomplete network without revealing information on the network topology. Since its introduction in TCC’15 by Moran et al., the research on THC has foc
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::110d56e35c1b1abeea7c478bec1d8702
https://doi.org/10.1007/978-3-030-45388-6_8
https://doi.org/10.1007/978-3-030-45388-6_8
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030579890
SCN
SCN
Most existing blockchains either rely on a Nakamoto-style of consensus, where the chain can fork and produce rollbacks, or on a committee-based Byzantine fault tolerant (CBFT) consensus, where no rollbacks are possible. While the latter ones offer be
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ac4d11130da59acbd9626029110fc8c5
https://doi.org/10.1007/978-3-030-57990-6_2
https://doi.org/10.1007/978-3-030-57990-6_2
Publikováno v:
Advances in Cryptology – ASIACRYPT 2020 ISBN: 9783030648398
ASIACRYPT (3)
ASIACRYPT (3)
Two paradigms for secure MPC are synchronous and asynchronous protocols. While synchronous protocols tolerate more corruptions and allow every party to give its input, they are very slow because the speed depends on the conservatively assumed worst-c
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::fb91325ea83b01a8037347a2391d7939
https://doi.org/10.1007/978-3-030-64840-4_4
https://doi.org/10.1007/978-3-030-64840-4_4
Publikováno v:
Advances in Cryptology – EUROCRYPT 2019-38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part I
Advances in Cryptology – EUROCRYPT 2019 ISBN: 9783030176525
EUROCRYPT (1)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – EUROCRYPT 2019
Advances in Cryptology – EUROCRYPT 2019 ISBN: 9783030176525
EUROCRYPT (1)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – EUROCRYPT 2019
Proof-of-stake (PoS) protocols are emerging as one of the most promising alternative to the wasteful proof-of-work (PoW) protocols for consensus in Blockchains (or distributed ledgers). However, current PoS protocols inherently disclose both the iden