Design and analysis of cryptographic algorithms in blockchain:
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boca Raton, FL
CRC Press
2021
|
Ausgabe: | First edition |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Includes bibliographical references |
Beschreibung: | xxii, 216 Seiten Diagramme |
ISBN: | 9781032039329 9781032039916 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV047573702 | ||
003 | DE-604 | ||
005 | 20220107 | ||
007 | t | ||
008 | 211104s2021 |||| |||| 00||| eng d | ||
020 | |a 9781032039329 |c hbk |9 978-1-03-203932-9 | ||
020 | |a 9781032039916 |c pbk |9 978-1-03-203991-6 | ||
020 | |z 9781003190127 |9 9781003190127 | ||
035 | |a (OCoLC)1264210562 | ||
035 | |a (DE-599)KXP174924070X | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-739 | ||
050 | 0 | |a QA76.9.B56 | |
084 | |a ST 520 |0 (DE-625)143678: |2 rvk | ||
100 | 1 | |a Huang, Ke |d 1989- |e Verfasser |0 (DE-588)1248944933 |4 aut | |
245 | 1 | 0 | |a Design and analysis of cryptographic algorithms in blockchain |c Ke Huang, Yi Mu, Fatemeh Rezaeibagha, Xiaosong Zhang |
250 | |a First edition | ||
264 | 1 | |a Boca Raton, FL |b CRC Press |c 2021 | |
300 | |a xxii, 216 Seiten |b Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references | ||
650 | 0 | 7 | |a Virtuelle Währung |0 (DE-588)1081489480 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Blockchain |0 (DE-588)1124028595 |2 gnd |9 rswk-swf |
653 | 0 | |a Blockchains (Databases) | |
653 | 0 | |a Data encryption (Computer science) | |
689 | 0 | 0 | |a Virtuelle Währung |0 (DE-588)1081489480 |D s |
689 | 0 | 1 | |a Blockchain |0 (DE-588)1124028595 |D s |
689 | 0 | 2 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Mu, Yi |d ca. 20./21. Jh. |e Verfasser |0 (DE-588)1248945182 |4 aut | |
700 | 1 | |a Rezaeibagha, Fatemeh |e Verfasser |0 (DE-588)1248945379 |4 aut | |
700 | 1 | |a Zhang, Xiaosong |e Verfasser |0 (DE-588)119851924X |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 9781003190127 |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032959265&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-032959265 |
Datensatz im Suchindex
_version_ | 1804182921736617984 |
---|---|
adam_text | Contents Foreword Preface xv xvii Acknowledgments xix Introduction xxi 1 Overview 1 1.1 1.2 1 1 1 2 2 2 3 4 4 5 6 9 1.3 1.4 1.5 1.6 Chapter Introduction .............................................................. Overview of Background ......................................................... 1.2.1 Blockchain .................................................................... 1.2.2 Modern Cryptography................................................... Motivation and Foundation of This Book .............................. 1.3.1 General Motivation......................................................... 1.3.2 Basic Foundations......................................................... Overview of Designing Practical PKC Scheme ..................... 1.4.1 Validating a PKC Scheme............................................. 1.4.2 Steps to Investigate PKC Scheme................................. Contributions .......................................................................... Chapter Summary.................................................................... 2 Preliminaries 2.1 2.2 2.3 2.4 Chapter Introduction .............................................................. Definitions of Research Objects ............................................. 2.2.1 Defining Blockchain...................................................... 2.2.2 Defining PKC Schemes ................................................ Complexity Theory ................................................................. 2.3.1 Computational ComplexityMeasurement................... Provable Security Theory and
Proof Techniques .................. 2.4.1 Proof by Security Reduction ....................................... 2.4.2 Proof by Sequences of Games .................................... 2.4.2.1 Transitions based on Indistinguishability . . 2.4.2.2 Transitions based on Failure Events............ 2.4.3 Proof by Contradiction ................................................ 2.4.4 Proof by Theorem......................................................... 11 11 11 11 12 13 14 14 15 16 16 17 18 18 vii
Contents ix Case Study: MLSAG Scheme..................................... 4.5.3.1 Construction of MLSAG .............................. 4.5.3.2 Security Analysis of MLSAG........................ 4.5.4 Efficiency Analysis of MLSAG ................................... 4.6 Ring Signature and Case Analysis .......................................... 4.6.1 Background of Ring Signature ................................... 4.6.2 Case Study: LRRS Scheme....................................... 4.6.2.1 Construction of LRRS..................................... 4.6.2.2 Security Requirement of LRRS...................... 4.6.2.3 Security Analysis of LRRS............................ 4.6.2.4 Efficiency Analysis of LRRS ......................... 4.7 Chapter Summary.................................................................... 58 58 59 62 63 63 64 64 65 66 68 70 Contents viii 2.4.5 Random Oracle Model................................................... 2.4.6 Standard Model ......................................................... 2.5 Algebraic Notions and Numeric Theory ................................. 2.5.1 Group, Ring andFields................................................. 2.5.1.1 Group............................................................. 2.5.1.2 Ring................................................................. 2.5.1.3 Field .............................................................. 2.5.1.4 Bilinear Pairing............................................ 2.5.1.5 Proof of Knowledge...................................... 2.5.2 Numeric
Theory.......................................................... 2.6 Chapter Summary..................................................................... 3 Background 3.1 3.2 Chapter Introduction ............................................................... Introduction to Blockchain ...................................................... 3.2.1 Bitcoin .......................................................................... 3.2.2 Ethereum....................................................................... 3.2.3 Other Cryptocurrencies................................................ 3.2.3.1 Cryptographic Scheme-Centered Altcoins . . 3.2.3.2 Other Altcoins ............................................ 3.3 Security Vulnerabilities, Attacks Countermeasures............ 3.3.1 Vulnerabilities of Altcoins .......................................... 3.3.2 Privacy Threat of Altcoins .......................................... 3.3.3 Attacks of Altcoins......................................................... 3.3.4 Countermeasures............................................................ 3.4 Chapter Summary..................................................................... 4 Public-Key Signature Scheme for Blockchain 4.1 Chapter Introduction ............................................................... 4.2 Overview of PKS ..................................................................... 4.2.1 Introduction to PKS...................................................... 4.2.2 PKS in Blockchain......................................................... 4.2.2.1 Use Case 1: ECDSA in
Bitcoin..................... 4.2.2.2 Use Case 2: MLSAG inMonero .................... 4.2.3 Definition of PKS ......................................................... 4.3 Case Analysis: ECDSA ............................................................ 4.3.1 Construction of ECDSA................................................ 4.3.2 Analysis of ECDSA’s Security and Efficiency............ 4.4 Case Analysis: BLS .................................................................. 4.4.1 Construction of BLS...................................................... 4.4.2 Security Requirement of BLS ....................................... 4.4.3 Security Analysis of BLS ............................................. 4.5 Group Signature and Case Analysis ....................................... 4.5.1 Background of Group Signature.................................... 4.5.2 Definition of Group Signature .................................... 19 19 19 20 20 20 21 21 21 22 24 4.5.3 25 25 25 27 29 32 32 34 35 35 36 37 39 44 45 45 45 45 46 46 46 47 48 49 50 51 51 52 52 56 56 57 5 Public-Key Encryption Scheme forBlockchain 5.1 Chapter Introduction .............................................................. 5.2 Overview of PKE .................................................................... 5.3 Introduction to PKE .............................................................. 5.3.1 PKE for Blockchain..................................................... 5.3.1.1 Use Case 1: ECC-Based Encryption in Bitcoin 5.3.1.2 Use Case 2: RSA in Blockchain...................... 5.3.1.3 Use Case 3: Pedersen
Commitments............. 5.3.1.4 Other Cases ................................................... 5.3.2 Definition of PKE........................................................ 5.4 Case Analysis: IBE ................................................................. 5.4.1 Background of IBE Scheme.......................................... 5.4.2 Construction of IBE Scheme ...................................... 5.4.2.1 BasicPub Scheme ......................................... 5.4.2.2 Basicldent Scheme.......................................... 5.4.2.3 Fullldent Scheme............................................ 5.4.3 Security Analysis of IBE Scheme................................. 5.4.3.1 Security Analysis BasicPub........................... 5.4.3.2 Security Analysis of Basicldent .................. 5.4.4 Security Analysis of Fullldent .................................... 5.5 Case Analysis of CS .............................................................. 5.5.1 Construction of CS........................................................ 5.5.2 Security Analysis of CS................................................ 5.6 Case Analysis of HDRS ........................................................... 5.6.1 Background of Signcryption......................................... 5.6.2 Construction of HDRS.................................................. 5.6.3 Security Requirement ofHDRS..................................... 5.6.4 Security Analysis of HDRS.......................................... 5.6.5 Efficiency Analysis of HDRS ....................................... 5.7 Methods to
Construct an IND-CCA2 Secure Encryption Scheme ...................................................................................... 5.7.1 Generic Methods to Achieve IND-CCA2..................... 71 71 72 72 72 73 73 73 73 74 75 75 76 76 76 77 77 77 78 79 83 83 84 88 88 88 90 90 92 93 94
Contents x 5.7.2 5.7.3 5.8 Background of IND-CCA2.............................................. IND-CCA2 from Non-Interactive Zero-Knowledge (NIZK) 96 5.7.4 IND-CCA2 from Random Oracle Model..................... 5.7.5 IND-CCA2 from (UHF)................................................. 5.7.5.1 Universal Hash Function.......................... 97 5.7.5.2 UHF Case: CS Scheme and Its Variants ... 5.7.6 IND-CCA2 from Hybrid Encryption (HY) and Use Case 5.7.7 IND-CCA2 from ElGamal and Its Extensions............ Chapter Summary...................................................................... Contents 94 96 96 97 98 98 99 6 Public-Key Hash Function for Blockchain 101 6.1 Chapter Introduction ................................................................. 101 6.2 Overview of PKH ....................................................................... 101 6.2.1 PKH in Blockchain........................................................... 102 6.2.2 Introduction to PKH........................................................ 103 6.2.3 Defining PKH.................................................................... 103 6.3 Case Analysis: ACH.................................................................... 104 6.3.1 Construction of ACH ..................................................... 105 6.3.2 Security Analysis of ACH.............................................. 105 6.4 Case Analysis: HCCH................................................................. 106 6.4.1 Construction of HCCH..................................................... 107 6.4.2 Security Requirement of
HCCH..................................... 107 6.4.3 Security Analysis of HCCH........................................... 108 6.4.3.1 Proof of Indistinguishability .......................... 108 6.4.3.2 Proof of Public Collision-Resistance........ 109 6.4.4 Efficiency Analysis of HCCH........................................ 110 6.5 Case Analysis: TUCH............................... Ill 6.5.1 Construction of TUCH..................................................... Ill 6.5.2 Security Requirement of TUCH..................................... 112 6.5.3 Security Analysis of TUCH........................................... 113 6.5.3.1 Proof of Indistinguishability for TUCH . . . 113 6.5.3.2 Proof of Collision-resistance....................... 114 6.5.4 Efficiency Analysis of TUCH........................................ 114 6.6 Case Analysis: RCH ................................................................. 115 6.6.1 Construction of RCH........................................................ 115 6.6.2 Security Requirement of RCH........................................ 115 6.6.3 Security Analysis of RCH.............................................. 117 6.6.3.1 Proof of Indistinguishability ........................... 117 6.6.3.2 Collision-Resistance between Non-Revoked Hash 118 6.6.3.3 Collision-Resistance between Revoked and Non-Revoked Hash ........................................ 120 6.6.4 Efficiency Analysis of RCH............................................ 120 6.7 Chapter Summary....................................................................... 121 8 xi 7 Zero-
Knowledge Proof for Blockchain 7.1 Chapter Introduction ................................................................. 7.2 Introduction to ZKP ................................................................. 7.3 ZKP in Blockchain....................................................................... 7.3.1 Use Case 1:NIZK in ZCoin............................................. 7.3.2 Use Case 2: zk-SNARK inZCash................................... 7.3.3 Other Use Cases.............................................................. 7.4 Introduction to of ZKP .............................................................. 7.4.1 Zero-Knowledge Proof and Argument ......................... 7.4.2 Non-Inter active Zero-Knowledge Proofs (NIZK) .... 7.4.3 Zero-Knowledge Succint Non-Interactive Arguments of Knowledge (zk-SNARK).................................................. 7.4.4 Known constructions and security of zk-SNARK . . . 7.5 Steps to Achieve a zk-SNARK ................................................. 7.5.1 Computation to Algebraic Circuit ............................... 7.5.2 Algebraic Circuit to R1CS ........................................... 7.5.2.1 What’s Arithmetic Circuits?......................... 7.5.2.2 Rank 1 Constraint System (R1CS)............... 7.5.3 R1CS to QAP ................................................................. 7.5.3.1 Quadratic Arithmetic Program (QAP) . . . 7.6 Case Analysis: GS08 Scheme .................................................... 7.6.1 Introduction to GS08 Scheme........................................ 7.6.2 Definition and Security
Requirement of GS08 Scheme 7.6.3 Analysis of GR08 Scheme.............................................. 7.6.4 Security Analysis of Groth and Sahai’s Scheme .... 7.7 Case Analysis: GR16 Scheme..................................................... 7.7.1 Non-Interactive Zero-Knowledge Arguments of Knowl edge .................................................................................... 7.7.2 Construction of Groth’s GR16 Scheme ...................... 7.7.3 Analysis of GR16’s First Construction ...................... 7.7.4 Analysis of Groth’s Second Construction ................... 7.8 Case Analysis: CA17 Scheme..................................................... 7.8.1 Prepare to Attack: Building ZK-SNARKs from QAP . 7.8.2 Potential Attacks: Learning Information by modifying the CRS............................................................................. 7.8.3 Open Problems for zk-SNARK..................................... 7.9 Chapter Summary....................................................................... 123 123 123 124 124 124 125 125 126 126 141 142 142 Tools as Optimizations for Blockchain 8.1 Chapter Introduction ................................................................. 8.2 Main Problems in Blockchain..................................................... 8.2.1 Security Problem.............................................................. 8.2.2 Privacy Problem.............................................................. 8.2.3 Efficiency and Scalability Problem............................... 8.2.4 Inflexibility and
Vulnerabilities..................................... 145 145 145 145 146 147 147 128 128 129 129 130 130 131 131 131 132 132 132 133 134 136 136 137 137 138 139 140
Contents 8.3 to Enhance Security ........................................................ Commitment.................................................................... Trapdoor Commitment .................................................. Merkle Hash Tree ........................................................... Public-Key Encryption..................................................... to Enhance Privacy-Preservation .................................. Zero-Knowledge Proof..................................................... Group Signature, Ring Signature, and Variants . . . Multi-Party Computation (SMPC)............................... Fully Homomorphic Encryption..................................... to Improve Flexibility and Vulnerabilities ................... Chameleon Hash as Solution ........................................ Malleable Signature as Solution..................................... 8.5.2.1 Malleable Signature........................................ 8.5.2.2 Chameleon Signature..................................... 8.5.2.3 Sanitizable Signature..................................... 8.5.2.4 Redactable Signature..................................... 8.5.2.5 Redactable Blockchain .................................. Tools to Improve Efficiency and Scalability ............................ 8.6.1 Accumulator.................................................................... 8.6.2 Bloom Filter.................................................................... 8.6.3 Micro Payment................................................................. 8.6.4 Lightning Payment
Channel........................................... Chapter Summary....................................................................... 148 149 149 150 151 151 151 152 152 153 153 153 154 154 155 155 155 155 157 157 158 158 159 160 9 Regulation and Economies of Blockchain 9.1 Chapter Introduction ................................................................. 9.2 Background ................................................................................. 9.3 Blockchain Regulation................................................................. 9.3.1 Global Developments of Regulation on Blockchain . . 9.3.2 Challenge Open Problem for Regulation ................ 9.3.3 Regulatory SandBox and Deployment......................... 9.3.4 Redactable Blockchain..................................................... 9.4 Economics .................................................................................... 9.4.1 Pricing .............................................................................. 9.4.2 Research of ICO in Blockchains..................................... 9.4.3 Ponzi Scheme in Blockchains........................................ 9.4.4 Study of Blockchain Economies..................................... 9.4.5 Business Process Execution........................................... 9.4.6 Application associated with Blockchain Economies . . 9.5 Chapter Summary....................................................................... 161 161 161 162 162 164 165 167 167 168 170 171 172 173 174 175 8.4 8.5 8.6 8.7 Tools 8.3.1 8.3.2 8.3.3 8.3.4 Tools 8.4.1 8.4.2 8.4.3 8.4.4
Tools 8.5.1 8.5.2 Contents 10 Concluding Remarks 10.1 Summary of Design andAnalysis .............................................. 10.2 Open Problems .......................................................................... 10.2.1 Challenges in Designing Practical PKS......................... 10.2.2 Challenges in Designing PracticalPKE ....................... 10.2.3 Challenges in Designing PracticalPKH ....................... 10.2.4 Challenges in Designing Practical ZKP........................ 10.2.5 Challenges inOptimizingBlockchain............................... 10.2.6 Challenges in Blockchain Regulation Blockchain Economies.......................................................................... 10.3 Conclusion .................................................................................... Bibliography xiii 177 177 igQ 180 180 181 181 182 182 լ83 լ85
|
adam_txt |
Contents Foreword Preface xv xvii Acknowledgments xix Introduction xxi 1 Overview 1 1.1 1.2 1 1 1 2 2 2 3 4 4 5 6 9 1.3 1.4 1.5 1.6 Chapter Introduction . Overview of Background . 1.2.1 Blockchain . 1.2.2 Modern Cryptography. Motivation and Foundation of This Book . 1.3.1 General Motivation. 1.3.2 Basic Foundations. Overview of Designing Practical PKC Scheme . 1.4.1 Validating a PKC Scheme. 1.4.2 Steps to Investigate PKC Scheme. Contributions . Chapter Summary. 2 Preliminaries 2.1 2.2 2.3 2.4 Chapter Introduction . Definitions of Research Objects . 2.2.1 Defining Blockchain. 2.2.2 Defining PKC Schemes . Complexity Theory . 2.3.1 Computational ComplexityMeasurement. Provable Security Theory and
Proof Techniques . 2.4.1 Proof by Security Reduction . 2.4.2 Proof by Sequences of Games . 2.4.2.1 Transitions based on Indistinguishability . . 2.4.2.2 Transitions based on Failure Events. 2.4.3 Proof by Contradiction . 2.4.4 Proof by Theorem. 11 11 11 11 12 13 14 14 15 16 16 17 18 18 vii
Contents ix Case Study: MLSAG Scheme. 4.5.3.1 Construction of MLSAG . 4.5.3.2 Security Analysis of MLSAG. 4.5.4 Efficiency Analysis of MLSAG . 4.6 Ring Signature and Case Analysis . 4.6.1 Background of Ring Signature . 4.6.2 Case Study: LRRS Scheme. 4.6.2.1 Construction of LRRS. 4.6.2.2 Security Requirement of LRRS. 4.6.2.3 Security Analysis of LRRS. 4.6.2.4 Efficiency Analysis of LRRS . 4.7 Chapter Summary. 58 58 59 62 63 63 64 64 65 66 68 70 Contents viii 2.4.5 Random Oracle Model. 2.4.6 Standard Model . 2.5 Algebraic Notions and Numeric Theory . 2.5.1 Group, Ring andFields. 2.5.1.1 Group. 2.5.1.2 Ring. 2.5.1.3 Field . 2.5.1.4 Bilinear Pairing. 2.5.1.5 Proof of Knowledge. 2.5.2 Numeric
Theory. 2.6 Chapter Summary. 3 Background 3.1 3.2 Chapter Introduction . Introduction to Blockchain . 3.2.1 Bitcoin . 3.2.2 Ethereum. 3.2.3 Other Cryptocurrencies. 3.2.3.1 Cryptographic Scheme-Centered Altcoins . . 3.2.3.2 Other Altcoins . 3.3 Security Vulnerabilities, Attacks Countermeasures. 3.3.1 Vulnerabilities of Altcoins . 3.3.2 Privacy Threat of Altcoins . 3.3.3 Attacks of Altcoins. 3.3.4 Countermeasures. 3.4 Chapter Summary. 4 Public-Key Signature Scheme for Blockchain 4.1 Chapter Introduction . 4.2 Overview of PKS . 4.2.1 Introduction to PKS. 4.2.2 PKS in Blockchain. 4.2.2.1 Use Case 1: ECDSA in
Bitcoin. 4.2.2.2 Use Case 2: MLSAG inMonero . 4.2.3 Definition of PKS . 4.3 Case Analysis: ECDSA . 4.3.1 Construction of ECDSA. 4.3.2 Analysis of ECDSA’s Security and Efficiency. 4.4 Case Analysis: BLS . 4.4.1 Construction of BLS. 4.4.2 Security Requirement of BLS . 4.4.3 Security Analysis of BLS . 4.5 Group Signature and Case Analysis . 4.5.1 Background of Group Signature. 4.5.2 Definition of Group Signature . 19 19 19 20 20 20 21 21 21 22 24 4.5.3 25 25 25 27 29 32 32 34 35 35 36 37 39 44 45 45 45 45 46 46 46 47 48 49 50 51 51 52 52 56 56 57 5 Public-Key Encryption Scheme forBlockchain 5.1 Chapter Introduction . 5.2 Overview of PKE . 5.3 Introduction to PKE . 5.3.1 PKE for Blockchain. 5.3.1.1 Use Case 1: ECC-Based Encryption in Bitcoin 5.3.1.2 Use Case 2: RSA in Blockchain. 5.3.1.3 Use Case 3: Pedersen
Commitments. 5.3.1.4 Other Cases . 5.3.2 Definition of PKE. 5.4 Case Analysis: IBE . 5.4.1 Background of IBE Scheme. 5.4.2 Construction of IBE Scheme . 5.4.2.1 BasicPub Scheme . 5.4.2.2 Basicldent Scheme. 5.4.2.3 Fullldent Scheme. 5.4.3 Security Analysis of IBE Scheme. 5.4.3.1 Security Analysis BasicPub. 5.4.3.2 Security Analysis of Basicldent . 5.4.4 Security Analysis of Fullldent . 5.5 Case Analysis of CS . 5.5.1 Construction of CS. 5.5.2 Security Analysis of CS. 5.6 Case Analysis of HDRS . 5.6.1 Background of Signcryption. 5.6.2 Construction of HDRS. 5.6.3 Security Requirement ofHDRS. 5.6.4 Security Analysis of HDRS. 5.6.5 Efficiency Analysis of HDRS . 5.7 Methods to
Construct an IND-CCA2 Secure Encryption Scheme . 5.7.1 Generic Methods to Achieve IND-CCA2. 71 71 72 72 72 73 73 73 73 74 75 75 76 76 76 77 77 77 78 79 83 83 84 88 88 88 90 90 92 93 94
Contents x 5.7.2 5.7.3 5.8 Background of IND-CCA2. IND-CCA2 from Non-Interactive Zero-Knowledge (NIZK) 96 5.7.4 IND-CCA2 from Random Oracle Model. 5.7.5 IND-CCA2 from (UHF). 5.7.5.1 Universal Hash Function. 97 5.7.5.2 UHF Case: CS Scheme and Its Variants . 5.7.6 IND-CCA2 from Hybrid Encryption (HY) and Use Case 5.7.7 IND-CCA2 from ElGamal and Its Extensions. Chapter Summary. Contents 94 96 96 97 98 98 99 6 Public-Key Hash Function for Blockchain 101 6.1 Chapter Introduction . 101 6.2 Overview of PKH . 101 6.2.1 PKH in Blockchain. 102 6.2.2 Introduction to PKH. 103 6.2.3 Defining PKH. 103 6.3 Case Analysis: ACH. 104 6.3.1 Construction of ACH . 105 6.3.2 Security Analysis of ACH. 105 6.4 Case Analysis: HCCH. 106 6.4.1 Construction of HCCH. 107 6.4.2 Security Requirement of
HCCH. 107 6.4.3 Security Analysis of HCCH. 108 6.4.3.1 Proof of Indistinguishability . 108 6.4.3.2 Proof of Public Collision-Resistance. 109 6.4.4 Efficiency Analysis of HCCH. 110 6.5 Case Analysis: TUCH. Ill 6.5.1 Construction of TUCH. Ill 6.5.2 Security Requirement of TUCH. 112 6.5.3 Security Analysis of TUCH. 113 6.5.3.1 Proof of Indistinguishability for TUCH . . . 113 6.5.3.2 Proof of Collision-resistance. 114 6.5.4 Efficiency Analysis of TUCH. 114 6.6 Case Analysis: RCH . 115 6.6.1 Construction of RCH. 115 6.6.2 Security Requirement of RCH. 115 6.6.3 Security Analysis of RCH. 117 6.6.3.1 Proof of Indistinguishability . 117 6.6.3.2 Collision-Resistance between Non-Revoked Hash 118 6.6.3.3 Collision-Resistance between Revoked and Non-Revoked Hash . 120 6.6.4 Efficiency Analysis of RCH. 120 6.7 Chapter Summary. 121 8 xi 7 Zero-
Knowledge Proof for Blockchain 7.1 Chapter Introduction . 7.2 Introduction to ZKP . 7.3 ZKP in Blockchain. 7.3.1 Use Case 1:NIZK in ZCoin. 7.3.2 Use Case 2: zk-SNARK inZCash. 7.3.3 Other Use Cases. 7.4 Introduction to of ZKP . 7.4.1 Zero-Knowledge Proof and Argument . 7.4.2 Non-Inter active Zero-Knowledge Proofs (NIZK) . 7.4.3 Zero-Knowledge Succint Non-Interactive Arguments of Knowledge (zk-SNARK). 7.4.4 Known constructions and security of zk-SNARK . . . 7.5 Steps to Achieve a zk-SNARK . 7.5.1 Computation to Algebraic Circuit . 7.5.2 Algebraic Circuit to R1CS . 7.5.2.1 What’s Arithmetic Circuits?. 7.5.2.2 Rank 1 Constraint System (R1CS). 7.5.3 R1CS to QAP . 7.5.3.1 Quadratic Arithmetic Program (QAP) . . . 7.6 Case Analysis: GS08 Scheme . 7.6.1 Introduction to GS08 Scheme. 7.6.2 Definition and Security
Requirement of GS08 Scheme 7.6.3 Analysis of GR08 Scheme. 7.6.4 Security Analysis of Groth and Sahai’s Scheme . 7.7 Case Analysis: GR16 Scheme. 7.7.1 Non-Interactive Zero-Knowledge Arguments of Knowl edge . 7.7.2 Construction of Groth’s GR16 Scheme . 7.7.3 Analysis of GR16’s First Construction . 7.7.4 Analysis of Groth’s Second Construction . 7.8 Case Analysis: CA17 Scheme. 7.8.1 Prepare to Attack: Building ZK-SNARKs from QAP . 7.8.2 Potential Attacks: Learning Information by modifying the CRS. 7.8.3 Open Problems for zk-SNARK. 7.9 Chapter Summary. 123 123 123 124 124 124 125 125 126 126 141 142 142 Tools as Optimizations for Blockchain 8.1 Chapter Introduction . 8.2 Main Problems in Blockchain. 8.2.1 Security Problem. 8.2.2 Privacy Problem. 8.2.3 Efficiency and Scalability Problem. 8.2.4 Inflexibility and
Vulnerabilities. 145 145 145 145 146 147 147 128 128 129 129 130 130 131 131 131 132 132 132 133 134 136 136 137 137 138 139 140
Contents 8.3 to Enhance Security . Commitment. Trapdoor Commitment . Merkle Hash Tree . Public-Key Encryption. to Enhance Privacy-Preservation . Zero-Knowledge Proof. Group Signature, Ring Signature, and Variants . . . Multi-Party Computation (SMPC). Fully Homomorphic Encryption. to Improve Flexibility and Vulnerabilities . Chameleon Hash as Solution . Malleable Signature as Solution. 8.5.2.1 Malleable Signature. 8.5.2.2 Chameleon Signature. 8.5.2.3 Sanitizable Signature. 8.5.2.4 Redactable Signature. 8.5.2.5 Redactable Blockchain . Tools to Improve Efficiency and Scalability . 8.6.1 Accumulator. 8.6.2 Bloom Filter. 8.6.3 Micro Payment. 8.6.4 Lightning Payment
Channel. Chapter Summary. 148 149 149 150 151 151 151 152 152 153 153 153 154 154 155 155 155 155 157 157 158 158 159 160 9 Regulation and Economies of Blockchain 9.1 Chapter Introduction . 9.2 Background . 9.3 Blockchain Regulation. 9.3.1 Global Developments of Regulation on Blockchain . . 9.3.2 Challenge Open Problem for Regulation . 9.3.3 Regulatory SandBox and Deployment. 9.3.4 Redactable Blockchain. 9.4 Economics . 9.4.1 Pricing . 9.4.2 Research of ICO in Blockchains. 9.4.3 Ponzi Scheme in Blockchains. 9.4.4 Study of Blockchain Economies. 9.4.5 Business Process Execution. 9.4.6 Application associated with Blockchain Economies . . 9.5 Chapter Summary. 161 161 161 162 162 164 165 167 167 168 170 171 172 173 174 175 8.4 8.5 8.6 8.7 Tools 8.3.1 8.3.2 8.3.3 8.3.4 Tools 8.4.1 8.4.2 8.4.3 8.4.4
Tools 8.5.1 8.5.2 Contents 10 Concluding Remarks 10.1 Summary of Design andAnalysis . 10.2 Open Problems . 10.2.1 Challenges in Designing Practical PKS. 10.2.2 Challenges in Designing PracticalPKE . 10.2.3 Challenges in Designing PracticalPKH . 10.2.4 Challenges in Designing Practical ZKP. 10.2.5 Challenges inOptimizingBlockchain. 10.2.6 Challenges in Blockchain Regulation Blockchain Economies. 10.3 Conclusion . Bibliography xiii 177 177 igQ 180 180 181 181 182 182 լ83 լ85 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Huang, Ke 1989- Mu, Yi ca. 20./21. Jh Rezaeibagha, Fatemeh Zhang, Xiaosong |
author_GND | (DE-588)1248944933 (DE-588)1248945182 (DE-588)1248945379 (DE-588)119851924X |
author_facet | Huang, Ke 1989- Mu, Yi ca. 20./21. Jh Rezaeibagha, Fatemeh Zhang, Xiaosong |
author_role | aut aut aut aut |
author_sort | Huang, Ke 1989- |
author_variant | k h kh y m ym f r fr x z xz |
building | Verbundindex |
bvnumber | BV047573702 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.B56 |
callnumber-search | QA76.9.B56 |
callnumber-sort | QA 276.9 B56 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 520 |
ctrlnum | (OCoLC)1264210562 (DE-599)KXP174924070X |
discipline | Informatik |
discipline_str_mv | Informatik |
edition | First edition |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02086nam a2200493 c 4500</leader><controlfield tag="001">BV047573702</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220107 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">211104s2021 |||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781032039329</subfield><subfield code="c">hbk</subfield><subfield code="9">978-1-03-203932-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781032039916</subfield><subfield code="c">pbk</subfield><subfield code="9">978-1-03-203991-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781003190127</subfield><subfield code="9">9781003190127</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1264210562</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KXP174924070X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.B56</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 520</subfield><subfield code="0">(DE-625)143678:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Huang, Ke</subfield><subfield code="d">1989-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1248944933</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Design and analysis of cryptographic algorithms in blockchain</subfield><subfield code="c">Ke Huang, Yi Mu, Fatemeh Rezaeibagha, Xiaosong Zhang</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton, FL</subfield><subfield code="b">CRC Press</subfield><subfield code="c">2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxii, 216 Seiten</subfield><subfield code="b">Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Virtuelle Währung</subfield><subfield code="0">(DE-588)1081489480</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Blockchain</subfield><subfield code="0">(DE-588)1124028595</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Blockchains (Databases)</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Virtuelle Währung</subfield><subfield code="0">(DE-588)1081489480</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Blockchain</subfield><subfield code="0">(DE-588)1124028595</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mu, Yi</subfield><subfield code="d">ca. 20./21. Jh.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1248945182</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rezaeibagha, Fatemeh</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1248945379</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhang, Xiaosong</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)119851924X</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">9781003190127</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032959265&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032959265</subfield></datafield></record></collection> |
id | DE-604.BV047573702 |
illustrated | Not Illustrated |
index_date | 2024-07-03T18:31:11Z |
indexdate | 2024-07-10T09:15:14Z |
institution | BVB |
isbn | 9781032039329 9781032039916 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032959265 |
oclc_num | 1264210562 |
open_access_boolean | |
owner | DE-739 |
owner_facet | DE-739 |
physical | xxii, 216 Seiten Diagramme |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | CRC Press |
record_format | marc |
spelling | Huang, Ke 1989- Verfasser (DE-588)1248944933 aut Design and analysis of cryptographic algorithms in blockchain Ke Huang, Yi Mu, Fatemeh Rezaeibagha, Xiaosong Zhang First edition Boca Raton, FL CRC Press 2021 xxii, 216 Seiten Diagramme txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references Virtuelle Währung (DE-588)1081489480 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Blockchain (DE-588)1124028595 gnd rswk-swf Blockchains (Databases) Data encryption (Computer science) Virtuelle Währung (DE-588)1081489480 s Blockchain (DE-588)1124028595 s Kryptologie (DE-588)4033329-2 s DE-604 Mu, Yi ca. 20./21. Jh. Verfasser (DE-588)1248945182 aut Rezaeibagha, Fatemeh Verfasser (DE-588)1248945379 aut Zhang, Xiaosong Verfasser (DE-588)119851924X aut Erscheint auch als Online-Ausgabe 9781003190127 Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032959265&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Huang, Ke 1989- Mu, Yi ca. 20./21. Jh Rezaeibagha, Fatemeh Zhang, Xiaosong Design and analysis of cryptographic algorithms in blockchain Virtuelle Währung (DE-588)1081489480 gnd Kryptologie (DE-588)4033329-2 gnd Blockchain (DE-588)1124028595 gnd |
subject_GND | (DE-588)1081489480 (DE-588)4033329-2 (DE-588)1124028595 |
title | Design and analysis of cryptographic algorithms in blockchain |
title_auth | Design and analysis of cryptographic algorithms in blockchain |
title_exact_search | Design and analysis of cryptographic algorithms in blockchain |
title_exact_search_txtP | Design and analysis of cryptographic algorithms in blockchain |
title_full | Design and analysis of cryptographic algorithms in blockchain Ke Huang, Yi Mu, Fatemeh Rezaeibagha, Xiaosong Zhang |
title_fullStr | Design and analysis of cryptographic algorithms in blockchain Ke Huang, Yi Mu, Fatemeh Rezaeibagha, Xiaosong Zhang |
title_full_unstemmed | Design and analysis of cryptographic algorithms in blockchain Ke Huang, Yi Mu, Fatemeh Rezaeibagha, Xiaosong Zhang |
title_short | Design and analysis of cryptographic algorithms in blockchain |
title_sort | design and analysis of cryptographic algorithms in blockchain |
topic | Virtuelle Währung (DE-588)1081489480 gnd Kryptologie (DE-588)4033329-2 gnd Blockchain (DE-588)1124028595 gnd |
topic_facet | Virtuelle Währung Kryptologie Blockchain |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032959265&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT huangke designandanalysisofcryptographicalgorithmsinblockchain AT muyi designandanalysisofcryptographicalgorithmsinblockchain AT rezaeibaghafatemeh designandanalysisofcryptographicalgorithmsinblockchain AT zhangxiaosong designandanalysisofcryptographicalgorithmsinblockchain |