Full metadata record
DC FieldValueLanguage
dc.contributorDepartment of Computingen_US
dc.contributor.advisorAu, Man Ho (COMP)en_US
dc.contributor.advisorLuo, Xiapu Daniel (COMP)en_US
dc.contributor.advisorLiu, Yan Wang Dennis (COMP)en_US
dc.creatorYang, Xiao-
dc.identifier.urihttps://theses.lib.polyu.edu.hk/handle/200/11690-
dc.languageEnglishen_US
dc.publisherHong Kong Polytechnic Universityen_US
dc.rightsAll rights reserveden_US
dc.titlePractical escrow protocol for cryptocurrenciesen_US
dcterms.abstractEscrow protocol for cryptocurrencies is a two-party protocol that enables the fair exchange of goods or services with digital coins. An escrow protocol allows digital coins to be escrowed (i.e., locked) in a way that only the seller can claim the coins (when the deal is completed) or the buyer can claim the coin (when the deal is canceled) with the help of a trusted third party (TTP).en_US
dcterms.abstractExisting escrow protocols for cryptocurrencies are built based on various approaches with various security and efficiency trade-offs. In this thesis, we introduce a new approach based on verifiably encrypted signature (VES), a specific kind of digital signature whose validity can be verified in encrypted form. Escrow protocols constructed from our approach enjoy many desirable features, including (a) round-efficient; (b) privacy-preserving for participants; and (c) minimal TTP involvement.en_US
dcterms.abstractECDSA is the signature scheme adopted by major cryptocurrencies such as Bitcoin and Ethereum. To construct escrow protocols for these cryptocurrencies based on our approach, we develop an efficient verifiably encrypted ECDSA, which may be of independent interest. Besides ECDSA, EdDSA and Schnorr digital signatures are adopted in popular cryptocurrencies. To build escrow protocols to fit these popular cryptocurrencies, we generalize the above signature schemes as an EdDSA-like signature and propose a generic construction of verifiably encrypted signature scheme for EdDSA-like signature.en_US
dcterms.abstractWe conduct a thorough complexity analysis of the escrow protocol obtained from the above VES schemes and demonstrate its feasibility.en_US
dcterms.extent8, 92 pages : illustrationsen_US
dcterms.isPartOfPolyU Electronic Thesesen_US
dcterms.issued2022en_US
dcterms.educationalLevelPh.D.en_US
dcterms.educationalLevelAll Doctorateen_US
dcterms.LCSHCryptocurrenciesen_US
dcterms.LCSHEscrowsen_US
dcterms.LCSHDigital signaturesen_US
dcterms.LCSHHong Kong Polytechnic University -- Dissertationsen_US
dcterms.accessRightsopen accessen_US

Files in This Item:
File Description SizeFormat 
6210.pdfFor All Users810.91 kBAdobe PDFView/Open


Copyright Undertaking

As a bona fide Library user, I declare that:

  1. I will abide by the rules and legal ordinances governing copyright regarding the use of the Database.
  2. I will use the Database for the purpose of my research or private study only and not for circulation or further reproduction or any other purpose.
  3. I agree to indemnify and hold the University harmless from and against any loss, damage, cost, liability or expenses arising from copyright infringement or unauthorized usage.

By downloading any item(s) listed above, you acknowledge that you have read and understood the copyright undertaking as stated above, and agree to be bound by all of its terms.

Show simple item record

Please use this identifier to cite or link to this item: https://theses.lib.polyu.edu.hk/handle/200/11690