Fawkescoin - A Cryptocurrency Without Public-Key Cryptography
نویسندگان
چکیده
We present, Fawkescoin, a simple cryptocurrency using no public-key cryptography. Our proposal utilizes the distributed consensus mechanism of Bitcoin but for transactions replaces Bitcoin’s ECDSA signatures with hash-based Guy Fawkes signatures. While this introduces a number of complexities, it demonstrates that a distributed cryptocurrency is in fact possible with only symmetric cryptographic operations with no dramatic loss of efficiency overall and several efficiency gains.
منابع مشابه
The Blockchain Technology: Some Theory and Applications
Since its 2008 appearance as a cornerstone of the cryptocurrency bitcoin, the blockchain technology gained widespread attention as a modality to securily validate and store information without a trusted third party. Indeed trust is replaced by cryptographic security, epitomised by hash functions, a unique fingerprint of any information file. The paper is a quick overview of the main concepts an...
متن کاملCryptographic schemes, key exchange, public key
General cryptographic schemes are presented where keys can be one-time or ephemeral. Processes for key exchange are derived. Public key cryptographic schemes based on the new systems are established. Authentication and signature schemes are easy to implement. The schemes may be integrated with error-correcting coding schemes so that encryption/coding and decryption/decoding may be done simultan...
متن کاملPattern Language for Cryptographic Key Management
Many services in a distributed public network like the Internet require secure communications. Security in communications consists of confidentiality, integrity, authenticity, and non-repudiability. These aims can be achieved with cryptography. Key management plays a fundamental role in secure communications, as it is the basis of all cryptographic functions. This paper describes a pattern lang...
متن کاملGeneration of Cryptographic Keys from Personal Biometrics: An Illustration Based on Fingerprints
متن کامل
Provably Secure Cryptographic Constructions
Modern cryptography has virtually no provably secure constructions. Starting from the first Diffie–Hellman key agreement protocol (Diffie & Hellman, 1976) and the first public key cryptosystemRSA (Rivest et al., 1978), not a single public key cryptographic protocol has been proven secure. Note, however, that there exist secure secret key protocols, e.g., the one-time pad scheme (Shannon, 1949; ...
متن کامل