Teikhos, a signature scheme using one-time keys with proof-of-public-key

in #teikhos7 years ago (edited)

In the Teikhos signature scheme, resistance to attacks is separated from the asymmetric cryptography that is used for authentication, with a layer of symmetric cryptography as a “wall” or fortification, using one-time keys with proof-of-public-key.

Each transaction includes a new proof-of-public-key, for a new public-private key pair, used to authenticate the next transaction.

The “teikhos cipher” hides the asymmetric cryptography, shrinking the surface area for attacking the one-way function to a brief time-window between when a transaction has been broadcasted to the miners until when those miners have included it in the consensus.

Using symmetric cryptography and asymmetric cryptography for proof-of-public-key

This “teikhos cipher” should produce a proof-of-public-key, that is collision resistant (only one public-private key pair can produce its corresponding proof-of-public-key. )

There can be many ciphers that fullfil that criteria. One could be, a public key is signed with a one-way function f using its corresponding private key, then encrypted with itself as a symmetric key, resulting in a proof-of-public-key that can be authenticated by revealing the symmetric key (the public key) to the miners.

Sort:  

you are a professions in this field thanks for sharing your knowledge always

You are a reasonable person, you have nothing to say about your knowledge

you are right.....thanks for shsring

It was easy to get through buddy !Thanks :)

Coin Marketplace

STEEM 0.17
TRX 0.15
JST 0.028
BTC 61651.16
ETH 2369.36
USDT 1.00
SBD 2.50