Teikhos, a signature scheme using one-time keys with proof-of-public-key
In the Teikhos signature scheme, resistance to attacks is separated from the asymmetric cryptography that is used for authentication, with a layer of symmetric cryptography as a “wall” or fortification, using one-time keys with proof-of-public-key.
Each transaction includes a new proof-of-public-key, for a new public-private key pair, used to authenticate the next transaction.
The “teikhos cipher” hides the asymmetric cryptography, shrinking the surface area for attacking the one-way function to a brief time-window between when a transaction has been broadcasted to the miners until when those miners have included it in the consensus.
Using symmetric cryptography and asymmetric cryptography for proof-of-public-key
This “teikhos cipher” should produce a proof-of-public-key, that is collision resistant (only one public-private key pair can produce its corresponding proof-of-public-key. )
There can be many ciphers that fullfil that criteria. One could be, a public key is signed with a one-way function f using its corresponding private key, then encrypted with itself as a symmetric key, resulting in a proof-of-public-key that can be authenticated by revealing the symmetric key (the public key) to the miners.
you are a professions in this field thanks for sharing your knowledge always
You are a reasonable person, you have nothing to say about your knowledge
you are right.....thanks for shsring
It was easy to get through buddy !Thanks :)