Skip to main content

Showing 1–3 of 3 results for author: Tan, T G

Searching in archive cs. Search in all archives.
.
  1. arXiv:2109.07316  [pdf, other

    cs.NI cs.CR cs.DC stat.AP

    Reinshard: An optimally sharded dual-blockchain for concurrency resolution

    Authors: Vishal Sharma, Zengpeng Li, Pawel Szalachowski, Teik Guan Tan, Jianying Zhou

    Abstract: Decentralized control, low-complexity, flexible and efficient communications are the requirements of an architecture that aims to scale blockchains beyond the current state. Such properties are attainable by reducing ledger size and providing parallel operations in the blockchain. Sharding is one of the approaches that lower the burden of the nodes and enhance performance. However, the current sol… ▽ More

    Submitted 15 September, 2021; originally announced September 2021.

    Comments: 14 pages, 9 figures, 3 tables

  2. arXiv:2109.02012  [pdf, ps, other

    cs.CR cs.CY cs.DC

    Post-Quantum VRF and its Applications in Future-Proof Blockchain System

    Authors: Zengpeng Li, Teik Guan Tan, Pawel Szalachowski, Vishal Sharma, Jianying Zhou

    Abstract: A verifiable random function (VRF in short) is a powerful pseudo-random function that provides a non-interactively public verifiable proof for the correctness of its output. Recently, VRFs have found essential applications in blockchain design, such as random beacons and proof-of-stake consensus protocols. To our knowledge, the first generation of blockchain systems used inherently inefficient pro… ▽ More

    Submitted 5 September, 2021; originally announced September 2021.

    Comments: 13 pages; 5 figures; 45 References; 3 tables; this paper is our original unpublished work

    MSC Class: 68Q85; (Primary) 94A60; 68M25(Secondary)

  3. arXiv:2011.06257  [pdf, other

    cs.NI cs.CR

    Securing Password Authentication for Web-based Applications

    Authors: Teik Guan Tan, Pawel Szalachowski, Jianying Zhou

    Abstract: The use of passwords and the need to protect passwords are not going away. The majority of websites that require authentication continue to support password authentication. Even high-security applications such as Internet Banking portals, which deploy 2-factor authentication, rely on password authentication as one of the authentication factors. However phishing attacks continue to plague password-… ▽ More

    Submitted 12 November, 2020; originally announced November 2020.

    Comments: 23 pages, 1 figure