Back to Results
First PageMeta Content
Public-key cryptography / Elliptic curve Diffie–Hellman / Diffie–Hellman key exchange / YAK / Electronic money / Digital signature / Elliptic Curve DSA / MQV / Shared secret / Cryptography / Cryptographic protocols / Bitcoin


Authenticated Key Exchange over Bitcoin Patrick McCorry, Siamak F. Shahandashti, Dylan Clarke, Feng Hao Newcastle University, UK {patrick.mccorry,siamak.shahandashti,dylan.clarke,feng.hao}@ncl.ac.uk Abstract. Bitcoin is
Add to Reading List

Document Date: 2015-04-03 08:37:15


Open Document

File Size: 513,53 KB

Share Result on Facebook

Company

Dell / Paypal / Expedia / Bitcoin Core / rA sA / /

Currency

pence / USD / /

/

Event

FDA Phase / /

Facility

Feng Hao Newcastle University / Calyx Institute / /

IndustryTerm

non-interactive protocol / online purchases / verification algorithm / authenticated key exchange protocols / concrete protocols / on-line payment system / e-commerce websites / trivial solution / secure time stamp server / online currency / signature generation algorithm / block chain / authenticated key exchange protocol / /

Organization

Mozilla Foundation / Newcastle University / Calyx Institute / /

Person

Bob Table / Compute / Alice Fig / Siamak F. Shahandashti / Patrick McCorry / /

Position

vP / miner / wB / /

Product

OpenSSL suite / Our solutions / OpenSSL / /

Technology

signature generation algorithm / 2 Schnorr Zero Knowledge Proof Generation Algorithm / two authenticated key exchange protocols / second protocol / One protocol / ECDSA algorithm / PKI / Key exchange protocols / AKE protocols / present two concrete protocols / private key / two protocols / secret key / underlying Elliptic Curve Digital Signature Algorithm / Bitcoin protocol / 1 ECDSA Signature Generation algorithm / 3 Schnorr Zero Knowledge Proof Verification Algorithm / PKI system / encryption / PKI-based YAK key exchange protocol / authenticated key exchange protocol / cryptography / subsequent AKE protocols / public key / verification algorithm / 4 Security Analysis Our protocols / digital signature / authenticated key exchange protocols / non-interactive protocol / interactive protocol / AKE protocol / /

SocialTag