Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Strong Known Related-Key Attacks and the Security of ECDSA

    The classical related-key attack (RKA) model fails to capture some real world systems that introduce related secret keys by design. In some blockchain applications, public keys are generated in a way that th...

    Tsz Hon Yuen, Siu-Ming Yiu in Network and System Security (2019)

  2. No Access

    Chapter and Conference Paper

    Privacy-Preserving Blockchain-Based Traceability System with Decentralized Ciphertext-Policy Attribute-Based Encryption

    Traceability, being the ability to access information of an item throughout its lifecycle, plays an important part in current supply chain, facilitating prompt response in case of incidents. In recent years, b...

    Tsz Ho Pun, Yi Jun He, Siu Ming Yiu in Ubiquitous Security (2024)