- Pharmacogenetics and Drug Metabolism
- Computational Drug Discovery Methods
- Eicosanoids and Hypertension Pharmacology
- Cancer Treatment and Pharmacology
- Diet, Metabolism, and Disease
- Neuroendocrine regulation and behavior
- Cryptographic Implementations and Security
- Blockchain Technology Applications and Security
- Primate Behavior and Ecology
- Cryptography and Data Security
- Stress Responses and Cortisol
Weifang Medical University
2025
Institute of Information Engineering
2024
Tianjin University of Science and Technology
2024
Tianjin Institute of Industrial Biotechnology
2024
Chinese Academy of Sciences
2024
Abstract Stealth address protocol (SAP) is widely used in blockchain to achieve anonymity. In this paper, we formalize a key derivable signature scheme (KDS) capture the functionality and security requirements of SAP. We then propose framework construct separation KDS, which follows principle as all existing SAP solutions avoid reuse master keys derivation component. also study joint KDS reusing framework, implies first compact stealth using single pair. Finally, provide instantiations based...