all InfoSec news
Efficient Post-Quantum Secure Deterministic Threshold Wallets from Isogenies
Dec. 15, 2023, 1:36 a.m. |
IACR News www.iacr.org
ePrint Report: Efficient Post-Quantum Secure Deterministic Threshold Wallets from Isogenies
Poulami Das, Andreas Erwig, Michael Meyer, Patrick Struck
Cryptocurrency networks crucially rely on digital signature schemes, which are used as an authentication mechanism for transactions. Unfortunately, most major cryptocurrencies today, including Bitcoin and Ethereum, employ signature schemes that are susceptible to quantum adversaries, i.e., an adversary with access to a quantum computer can forge signatures and thereby spend coins of honest users. In cryptocurrency networks, signature schemes are typically not …
authentication bitcoin cryptocurrencies cryptocurrency digital digital signature eprint report ethereum major mechanism michael networks post-quantum quantum quantum secure report signature threshold today transactions wallets
More from www.iacr.org / IACR News
Information-theoretic security with asymmetries
2 days, 12 hours ago |
www.iacr.org
Cryptanalytic Audit of the XHash Sponge Function and its Components
2 days, 12 hours ago |
www.iacr.org
Implementation and Performance Analysis of Homomorphic Signature Schemes
2 days, 12 hours ago |
www.iacr.org
Ipotane: Achieving the Best of All Worlds in Asynchronous BFT
2 days, 12 hours ago |
www.iacr.org
Jobs in InfoSec / Cybersecurity
Azure DevSecOps Cloud Engineer II
@ Prudent Technology | McLean, VA, USA
Security Engineer III - Python, AWS
@ JPMorgan Chase & Co. | Bengaluru, Karnataka, India
SOC Analyst (Threat Hunter)
@ NCS | Singapore, Singapore
Managed Services Information Security Manager
@ NTT DATA | Sydney, Australia
Senior Security Engineer (Remote)
@ Mattermost | United Kingdom
Penetration Tester (Part Time & Remote)
@ TestPros | United States - Remote