Circular Image

4 records found

Inject Less, Recover More

Unlocking the Potential of Document Recovery in Injection Attacks Against SSE

Searchable symmetric encryption has been vulnerable to inference attacks that rely on uniqueness in leakage patterns. However, many keywords in datasets lack distinctive leakage patterns, limiting the effectiveness of such attacks. The file injection attacks, initially proposed b ...

Operating ZKPs on Blockchain

A Performance Analysis Based on Hyperledger Fabric

Preserving privacy in blockchain-based systems is crucial for ensuring anonymity and confidentiality during transactions. While cryptographic solutions can address on-chain privacy concerns, their implementation on blockchains may introduce performance overhead, which remains unc ...

From CoWs to Multi-Chain AMMs

A Strategic Optimization Model for Enhancing Solvers

In the rapidly evolving decentralized finance (DeFi) ecosystem, ensuring efficient and interoperable transaction mechanisms is a critical challenge. To address this issue, this paper introduces a strategic optimization model for a blockchain-based token exchange platform. By leve ...
The emergence of blockchain technologies has created the possibility of transforming business processes in the form of immutable agreements called smart contracts. Smart contracts suffer from a major limitation; they cannot authenticate the trustworthiness of real-world data sour ...