This study examines blockchain technologies and their pivotal role in the evolving Metaverse,shedding light on topics such as how to invest in cryptocurrency,the mechanics behind crypto mining,and strategies to effect...This study examines blockchain technologies and their pivotal role in the evolving Metaverse,shedding light on topics such as how to invest in cryptocurrency,the mechanics behind crypto mining,and strategies to effectively buy and trade cryptocurrencies.While it contextualises the common queries of"why is crypto crashing?"and"why is crypto down?",the research transcends beyond the frequent market fluctuations to unravel how cryptocurrencies fundamentally work and the step-by-step process on how to create a cryptocurrency.Contrasting existing literature,this comprehensive investigation encompasses both the economic and cybersecurity risks inherent in the blockchain and fintech spheres.Through an interdisciplinary approach,the research transitions from the fundamental principles of fintech investment strategies to the overarching implications of blockchain within the Metaverse.Alongside exploring machine learning potentials in financial sectors and risk assessment methodologies,the study critically assesses whether developed or developing nations are poised to reap greater benefits from these technologies.Moreover,it probes into both enduring and dubious crypto projects,drawing a distinct line between genuine blockchain applications and Ponzi-like schemes.The conclusion resolutely affirms the staying power of blockchain technologies,underlined by a profound exploration of their intrinsic value and a reflective commentary by the author on the potential risks confronting individual investors.展开更多
This paper investigates the role of Fibonacci retracements levels,a popular technical analysis indicator,in predicting stock prices of leading U.S.energy companies and energy cryptocurrencies.The study methodology foc...This paper investigates the role of Fibonacci retracements levels,a popular technical analysis indicator,in predicting stock prices of leading U.S.energy companies and energy cryptocurrencies.The study methodology focuses on applying Fibonacci retracements as a system compared with the buy-and-hold strategy.Daily crypto and stock prices were obtained from the Standard&Poor’s composite 1500 energy index and CoinMarketCap between November 2017 and January 2020.This study also examined if the combined Fibonacci retracements and the price crossover strategy result in a higher return per unit of risk.Our findings revealed that Fibonacci retracement captures energy stock price changes better than cryptos.Furthermore,most price violations were frequent during price falls compared to price increases,supporting that the Fibonacci instrument does not capture price movements during up and downtrends,respectively.Also,fewer consecutive retracement breaks were observed when the price violations were examined 3 days before the current break.Furthermore,the Fibonacci-based strategy resulted in higher returns relative to the naïve buy-and-hold model.Finally,complementing Fibonacci with the price cross strategy did not improve the results and led to fewer or no trades for some constituents.This study’s overall findings elucidate that,despite significant drops in oil prices,speculators(traders)can implement profitable strategies when using technical analysis indicators,like the Fibonacci retracement tool,with or without price crossover rules.展开更多
Similar to the classical meet-in-the-middle algorithm,the storage and computation complexity are the key factors that decide the efficiency of the quantum meet-in-the-middle algorithm.Aiming at the target vector of fi...Similar to the classical meet-in-the-middle algorithm,the storage and computation complexity are the key factors that decide the efficiency of the quantum meet-in-the-middle algorithm.Aiming at the target vector of fixed weight,based on the quantum meet-in-the-middle algorithm,the algorithm for searching all n-product vectors with the same weight is presented,whose complexity is better than the exhaustive search algorithm.And the algorithm can reduce the storage complexity of the quantum meet-in-the-middle search algorithm.Then based on the algorithm and the knapsack vector of the Chor-Rivest public-key crypto of fixed weight d,we present a general quantum meet-in-th√e-middle search algorithm based on the target solution of fixed weight,whose computational complexity is∑(d to j=0)(O((1/2)(C^(d-j)_(n-k+1))+O(C^j_klog C^j_k))with∑(d to i=0)C^i_k memory cost.And the optimal value of k is given.Compared to thequantum meet-in-the-middle search algorithm for knapsack problem and the quantum algorithm for searching a target solution of fixed weight,the computational complexity of the algorithm is lower.And its storage complexity is smaller than the quantum meet-in-the-middle-algorithm.展开更多
Medical data mining has become an essential task in healthcare sector to secure the personal and medical data of patients using privacy policy.In this background,several authentication and accessibility issues emerge ...Medical data mining has become an essential task in healthcare sector to secure the personal and medical data of patients using privacy policy.In this background,several authentication and accessibility issues emerge with an inten-tion to protect the sensitive details of the patients over getting published in open domain.To solve this problem,Multi Attribute Case based Privacy Preservation(MACPP)technique is proposed in this study to enhance the security of privacy-preserving data.Private information can be any attribute information which is categorized as sensitive logs in a patient’s records.The semantic relation between transactional patient records and access rights is estimated based on the mean average value to distinguish sensitive and non-sensitive information.In addition to this,crypto hidden policy is also applied here to encrypt the sensitive data through symmetric standard key log verification that protects the personalized sensitive information.Further,linear integrity verification provides authentication rights to verify the data,improves the performance of privacy preserving techni-que against intruders and assures high security in healthcare setting.展开更多
This research investigates the appropriateness of the linear specification of the market model for modeling and forecasting the cryptocurrency prices during the pre-COVID-19 and COVID-19 periods.Two extensions are off...This research investigates the appropriateness of the linear specification of the market model for modeling and forecasting the cryptocurrency prices during the pre-COVID-19 and COVID-19 periods.Two extensions are offered to compare the performance of the linear specification of the market model(LMM),which allows for the measurement of the cryptocurrency price beta risk.The first is the generalized additive model,which permits flexibility in the rigid shape of the linearity of the LMM.The second is the time-varying linearity specification of the LMM(Tv-LMM),which is based on the state space model form via the Kalman filter,allowing for the measurement of the time-varying beta risk of the cryptocurrency price.The analysis is performed using daily data from both time periods on the top 10 cryptocurrencies by adjusted market capitalization,using the Crypto Currency Index 30(CCI30)as a market proxy and 1-day and 7-day forward predictions.Such a comparison of cryptocurrency prices has yet to be undertaken in the literature.The empirical findings favor the Tv-LMM,which outperforms the others in terms of modeling and forecasting performance.This result suggests that the relationship between each cryptocurrency price and the CCI30 index should be locally instead of globally linear,especially during the COVID-19 period.展开更多
PRINCE is a 64-bit lightweight block cipher with a 128-bit key published at ASIACRYPT 2012. Assuming one nibble fault is injected, previous different fault analysis(DFA) on PRINCE adopted the technique from DFA on AES...PRINCE is a 64-bit lightweight block cipher with a 128-bit key published at ASIACRYPT 2012. Assuming one nibble fault is injected, previous different fault analysis(DFA) on PRINCE adopted the technique from DFA on AES and current results are different. This paper aims to make a comprehensive study of algebraic fault analysis(AFA) on PRINCE. How to build the equations for PRINCE and faults are explained. Extensive experiments are conducted. Under nibble-based fault model, AFA with three or four fault injections can succeed within 300 seconds with a very high probability. Under other fault models such as byte-based, half word-based, word-based fault models, the faults become overlapped in the last round and previous DFAs are difficult to work. Our results show that AFA can still succeed to recover the full master key. To evaluate security of PRINCE against fault attacks, we utilize AFA to calculate the reduced entropy of the secret key for given amount of fault injections. The results can interpret and compare the efficiency of previous work. Under nibble-based fault model, the master key of PRINCE can be reduced to 29.69 and 236.10 with 3 and 2 fault injections on average, respectively.展开更多
This paper deals with the implementation of algorithms and tools for the security of academic data protection in the Democratic Republic of the Congo. It consists principally in implementing two algorithms and two dis...This paper deals with the implementation of algorithms and tools for the security of academic data protection in the Democratic Republic of the Congo. It consists principally in implementing two algorithms and two distinct tools to secure data and in this particular case, academic data of higher and university education in the Democratic Republic of the Congo. The design of algorithms meets the approach that any researcher in data encryption must use during the development of a computer system. Briefly, these algorithms are steps to follow to encrypt information in any programming language. These algorithms are based on symmetric and asymmetric encryption, the first one uses Christopher Hill’s algorithm, which uses texts in the form of matrices before they are encrypted and RSA as one of the asymmetric algorithms, it uses the prime numbers that we have encoded on more than 512 bits. As for tools, we have developed them in php which is only a programming language taken as an example because it is impossible to use all of them. The tools implemented are based on the algorithms of Caesar, Christopher Hill, and RSA showing how the encryption operations are carried out thanks to graphical interfaces. They are only tools for pedagogical reasons to help students and other researchers learn how to use developed algorithms. We have not developed them for pleasure but rather to be used in any information system, which would prevent and limit unauthorized access to computer systems. They will not be used only for the management of academic fees but for any other information system, which explains and shows the complexity of the tools developed. We have not been able to solve the problems of versions for the developed prototype, because if there is a new version later some functions may be obsolete, which would constitute the limitation of these tools. This work targets primarily the Ministry of Higher Education and Universities, which will make these results its own and implement them in order to solve the problem of intrusions, and unauthorized access to developers and researchers who will use tools already made instead of thinking about their development. We are trying to demonstrate the steps and the methodology that allowed us to reach our results, in the following lines.展开更多
In recent years,the rise of blockchain technology and its applications has led the software development industry to consider blockchain-powered Decentralized Applications(dApps)as serverless REST APIs.However,to engag...In recent years,the rise of blockchain technology and its applications has led the software development industry to consider blockchain-powered Decentralized Applications(dApps)as serverless REST APIs.However,to engage with dApps,users require a blockchain wallet.This tool facilitates the generation and secure storage of a user’s private key and verfies their identity,among other functionalities.Despite their utility,blockchain wallets present significant challenges,such as reliance on trusted third parties,vulnerability to adversaries observing and potentially linking user interactions,key recovery issues,and synchronization of cryptographic keys across multiple devices.This paper addresses these challenges by introducing a fully decentralized multi-platform wallet that leverages blockchain and InterPlanetary File System(IPFS)technologies for managing asymmetric keys and enabling key recovery.This novel approach empowers users to interact with dApps built on blockchain smart contracts while preserving their privacy and ensuring seamless key recovery in the case of device theft or damage.The proposed system is economically viable,with in-depth cost analysis,and demonstrates resilience against security and privacy attacks.A comparative analysis highlights the advantages of the new scheme over existing mainstream and state-of-the-art solutions.Finally,a preliminary prototype implementation is presented to validate the system’s feasibility.展开更多
With the development of quantum computing technology,quantum public-key cryptography is gradually becoming an alternative to the existing classical public-key cryptography.This paper designs a quantum trapdoor one-way...With the development of quantum computing technology,quantum public-key cryptography is gradually becoming an alternative to the existing classical public-key cryptography.This paper designs a quantum trapdoor one-way function via EPR pairs and quantum measurements.Based on this,a new quantum public-key cryptosystem is presented,which offers forward security,and can resist the chosen-plaintext attack and chosen-ciphertext attack.Compared with the existing quantum public-key cryptos,eavesdropping can be automatically detected in this new quantum public-key cryptosystem under a necessary condition,which is also detailed in the paper.展开更多
The compatibility of different quantum algorithms should be considered when these algorithms are combined.In this paper,the method of combining Grover and Simon is studied for the first time,under some preconditions o...The compatibility of different quantum algorithms should be considered when these algorithms are combined.In this paper,the method of combining Grover and Simon is studied for the first time,under some preconditions or assumptions.First,we give two preconditions of applying Grover’s algorithm,which ensure that the success probability of finding the marked element is close to 1.Then,based on these two preconditions,it is found out that the success probability of the quantum algorithm for FXconstruction is far less than 1.Furthermore,we give the design method of the Oracle function,and then present the general method of combining Grover and Simon algorithm for attacking block ciphers,with success probability close to 1.展开更多
To keep pace with the development of the crypto industry due to its sheer size and complex business models,the Organisation for Economic Co-operation and Development(OECD)introduced the Crypto Asset Reporting Framewor...To keep pace with the development of the crypto industry due to its sheer size and complex business models,the Organisation for Economic Co-operation and Development(OECD)introduced the Crypto Asset Reporting Framework(CARF)to enhance transparency in relevant transactions.It is envisaged that the introduction of CARF will facilitate the exchange of information and potentially lead to increase in tax revenues for those jurisdictions enacting such requirements in due course.In turn,industry players will need to assess the implications this will have in their business from reporting readiness and implementation perspectives.Meanwhile,the tokenisation of real-world assets(RWAs)is gaining momentum.The legal and tax implications that may arise from this latest development can be complex and uncertain.展开更多
Significant improvements should be made to increase the market potential of crypto mining.However,it is not financially feasible to make too many improvements because all actions lead to cost increases.In this context...Significant improvements should be made to increase the market potential of crypto mining.However,it is not financially feasible to make too many improvements because all actions lead to cost increases.In this context,it is necessary to determine the factors that most affect this process.Accordingly,the purpose of this study is to understand the main indicators that can improve the market potential of crypto mining activities.Therefore,the main research question of this study is to identify which factors should be prioritized while generating appropriate strategies to increase these activities.In this context,a new model has been constructed to answer this question.First,significant indicators are identified based on the evaluation of the literature.After that,these factors are weighted via quantum picture fuzzy rough set-based M-SWARA.The main contribution of this study is the generation of a new decision-making model to understand the key issues related to the market potential of crypto mining activities.The M-SWARA model is taken into consideration for criteria weighting.Owing to this issue,the causal relationships between the items can be identified.The findings demonstrate that reducing energy costs emerges as the most important factor for improving the market potential of the crypto mining industry.Furthermore,technological developments also play an important role in this regard.展开更多
This article discusses some major changes and developments in ac-counting standards(i.e.IFRS 15 and IFRS 16)and international taxation rules(i.e.the Two-Pillar solution under BEPS 2.0)and new business models(i.e.crypt...This article discusses some major changes and developments in ac-counting standards(i.e.IFRS 15 and IFRS 16)and international taxation rules(i.e.the Two-Pillar solution under BEPS 2.0)and new business models(i.e.cryptocurrencies and Non-Fungible Tokens)which may have significant impact on taxpayers and pose challenges to tax administrations on how to provide tax certainty and better taxpayer services.The article briefly analyses the impact of these developments on taxpayers and makes suggestions for tax policymakers and tax administrations in the Belt andwww.britacom.org Road jurisdictions.展开更多
The blockchain art market is partitioned around the roles of artists and collectors and highly concentrated among a few prominent figures.We hence propose to adapt Kleinberg's authority/hub HITS(Hyperlink-Induced ...The blockchain art market is partitioned around the roles of artists and collectors and highly concentrated among a few prominent figures.We hence propose to adapt Kleinberg's authority/hub HITS(Hyperlink-Induced Topic Search)method to rate artists and collectors in the art context.This seems a reasonable choice since the original method deftly defines its scores in terms of a mutual recursive relationship between authorities/artists—the miners of information/art,and hubs/collectors—the assemblers of such information/art.We evaluated the proposed method on the collector-artist network of SuperRare gallery,the major crypto art marketplace.We found that the proposed artist and collector metrics are weakly correlated with other networks science metrics like degree and strength.This hints at the possibility of coupling different measures in order to profile active users of the gallery and suggests investment strategies with different risk/reward ratios for collectors as well as marketing strategies with different targets for artists.展开更多
基金supported by the PETRAS National Centre of Excellence for IoT Systems Cybersecurity,which has been funded by the UK EPSRC[under grant number EP/S035362/1]the Software Sustainability Institute[grant number:EP/S021779/1]by the Cisco Research Centre[grant number CG1525381].
文摘This study examines blockchain technologies and their pivotal role in the evolving Metaverse,shedding light on topics such as how to invest in cryptocurrency,the mechanics behind crypto mining,and strategies to effectively buy and trade cryptocurrencies.While it contextualises the common queries of"why is crypto crashing?"and"why is crypto down?",the research transcends beyond the frequent market fluctuations to unravel how cryptocurrencies fundamentally work and the step-by-step process on how to create a cryptocurrency.Contrasting existing literature,this comprehensive investigation encompasses both the economic and cybersecurity risks inherent in the blockchain and fintech spheres.Through an interdisciplinary approach,the research transitions from the fundamental principles of fintech investment strategies to the overarching implications of blockchain within the Metaverse.Alongside exploring machine learning potentials in financial sectors and risk assessment methodologies,the study critically assesses whether developed or developing nations are poised to reap greater benefits from these technologies.Moreover,it probes into both enduring and dubious crypto projects,drawing a distinct line between genuine blockchain applications and Ponzi-like schemes.The conclusion resolutely affirms the staying power of blockchain technologies,underlined by a profound exploration of their intrinsic value and a reflective commentary by the author on the potential risks confronting individual investors.
文摘This paper investigates the role of Fibonacci retracements levels,a popular technical analysis indicator,in predicting stock prices of leading U.S.energy companies and energy cryptocurrencies.The study methodology focuses on applying Fibonacci retracements as a system compared with the buy-and-hold strategy.Daily crypto and stock prices were obtained from the Standard&Poor’s composite 1500 energy index and CoinMarketCap between November 2017 and January 2020.This study also examined if the combined Fibonacci retracements and the price crossover strategy result in a higher return per unit of risk.Our findings revealed that Fibonacci retracement captures energy stock price changes better than cryptos.Furthermore,most price violations were frequent during price falls compared to price increases,supporting that the Fibonacci instrument does not capture price movements during up and downtrends,respectively.Also,fewer consecutive retracement breaks were observed when the price violations were examined 3 days before the current break.Furthermore,the Fibonacci-based strategy resulted in higher returns relative to the naïve buy-and-hold model.Finally,complementing Fibonacci with the price cross strategy did not improve the results and led to fewer or no trades for some constituents.This study’s overall findings elucidate that,despite significant drops in oil prices,speculators(traders)can implement profitable strategies when using technical analysis indicators,like the Fibonacci retracement tool,with or without price crossover rules.
基金Supported by the National Basic Research Program of China under Grant No.2013CB338002the National Natural Science Foundation of China under Grant No.61502526
文摘Similar to the classical meet-in-the-middle algorithm,the storage and computation complexity are the key factors that decide the efficiency of the quantum meet-in-the-middle algorithm.Aiming at the target vector of fixed weight,based on the quantum meet-in-the-middle algorithm,the algorithm for searching all n-product vectors with the same weight is presented,whose complexity is better than the exhaustive search algorithm.And the algorithm can reduce the storage complexity of the quantum meet-in-the-middle search algorithm.Then based on the algorithm and the knapsack vector of the Chor-Rivest public-key crypto of fixed weight d,we present a general quantum meet-in-th√e-middle search algorithm based on the target solution of fixed weight,whose computational complexity is∑(d to j=0)(O((1/2)(C^(d-j)_(n-k+1))+O(C^j_klog C^j_k))with∑(d to i=0)C^i_k memory cost.And the optimal value of k is given.Compared to thequantum meet-in-the-middle search algorithm for knapsack problem and the quantum algorithm for searching a target solution of fixed weight,the computational complexity of the algorithm is lower.And its storage complexity is smaller than the quantum meet-in-the-middle-algorithm.
文摘Medical data mining has become an essential task in healthcare sector to secure the personal and medical data of patients using privacy policy.In this background,several authentication and accessibility issues emerge with an inten-tion to protect the sensitive details of the patients over getting published in open domain.To solve this problem,Multi Attribute Case based Privacy Preservation(MACPP)technique is proposed in this study to enhance the security of privacy-preserving data.Private information can be any attribute information which is categorized as sensitive logs in a patient’s records.The semantic relation between transactional patient records and access rights is estimated based on the mean average value to distinguish sensitive and non-sensitive information.In addition to this,crypto hidden policy is also applied here to encrypt the sensitive data through symmetric standard key log verification that protects the personalized sensitive information.Further,linear integrity verification provides authentication rights to verify the data,improves the performance of privacy preserving techni-que against intruders and assures high security in healthcare setting.
文摘This research investigates the appropriateness of the linear specification of the market model for modeling and forecasting the cryptocurrency prices during the pre-COVID-19 and COVID-19 periods.Two extensions are offered to compare the performance of the linear specification of the market model(LMM),which allows for the measurement of the cryptocurrency price beta risk.The first is the generalized additive model,which permits flexibility in the rigid shape of the linearity of the LMM.The second is the time-varying linearity specification of the LMM(Tv-LMM),which is based on the state space model form via the Kalman filter,allowing for the measurement of the time-varying beta risk of the cryptocurrency price.The analysis is performed using daily data from both time periods on the top 10 cryptocurrencies by adjusted market capitalization,using the Crypto Currency Index 30(CCI30)as a market proxy and 1-day and 7-day forward predictions.Such a comparison of cryptocurrency prices has yet to be undertaken in the literature.The empirical findings favor the Tv-LMM,which outperforms the others in terms of modeling and forecasting performance.This result suggests that the relationship between each cryptocurrency price and the CCI30 index should be locally instead of globally linear,especially during the COVID-19 period.
基金supported in part by the Major State Basic Research Development Program (973 Plan) of China under thegrant 2013CB338004the National Natural Science Foundation of China under the grants 61173191, 61271124, 61272491, 61309021, 61472357+1 种基金by the Zhejiang Provincial Natural Science Foundation of China under the grant LY13F010001by the Fundamental Research Funds for the Central Universities under the grant 2015QNA5005
文摘PRINCE is a 64-bit lightweight block cipher with a 128-bit key published at ASIACRYPT 2012. Assuming one nibble fault is injected, previous different fault analysis(DFA) on PRINCE adopted the technique from DFA on AES and current results are different. This paper aims to make a comprehensive study of algebraic fault analysis(AFA) on PRINCE. How to build the equations for PRINCE and faults are explained. Extensive experiments are conducted. Under nibble-based fault model, AFA with three or four fault injections can succeed within 300 seconds with a very high probability. Under other fault models such as byte-based, half word-based, word-based fault models, the faults become overlapped in the last round and previous DFAs are difficult to work. Our results show that AFA can still succeed to recover the full master key. To evaluate security of PRINCE against fault attacks, we utilize AFA to calculate the reduced entropy of the secret key for given amount of fault injections. The results can interpret and compare the efficiency of previous work. Under nibble-based fault model, the master key of PRINCE can be reduced to 29.69 and 236.10 with 3 and 2 fault injections on average, respectively.
文摘This paper deals with the implementation of algorithms and tools for the security of academic data protection in the Democratic Republic of the Congo. It consists principally in implementing two algorithms and two distinct tools to secure data and in this particular case, academic data of higher and university education in the Democratic Republic of the Congo. The design of algorithms meets the approach that any researcher in data encryption must use during the development of a computer system. Briefly, these algorithms are steps to follow to encrypt information in any programming language. These algorithms are based on symmetric and asymmetric encryption, the first one uses Christopher Hill’s algorithm, which uses texts in the form of matrices before they are encrypted and RSA as one of the asymmetric algorithms, it uses the prime numbers that we have encoded on more than 512 bits. As for tools, we have developed them in php which is only a programming language taken as an example because it is impossible to use all of them. The tools implemented are based on the algorithms of Caesar, Christopher Hill, and RSA showing how the encryption operations are carried out thanks to graphical interfaces. They are only tools for pedagogical reasons to help students and other researchers learn how to use developed algorithms. We have not developed them for pleasure but rather to be used in any information system, which would prevent and limit unauthorized access to computer systems. They will not be used only for the management of academic fees but for any other information system, which explains and shows the complexity of the tools developed. We have not been able to solve the problems of versions for the developed prototype, because if there is a new version later some functions may be obsolete, which would constitute the limitation of these tools. This work targets primarily the Ministry of Higher Education and Universities, which will make these results its own and implement them in order to solve the problem of intrusions, and unauthorized access to developers and researchers who will use tools already made instead of thinking about their development. We are trying to demonstrate the steps and the methodology that allowed us to reach our results, in the following lines.
基金supported by Project HERMES funded by the European Union NextGenerationEU/PRTR via INCIBE,by the project PID2021-125962OB-C32"SECURING/DATA"funded by MCIN/AEI/10.13039/501100011033/FEDER,UE,and by the grant 2021SGR 00115 from the Government of Cataloniasupported by the Spanish Government under an FPU grant(ref.FPU20/03254).
文摘In recent years,the rise of blockchain technology and its applications has led the software development industry to consider blockchain-powered Decentralized Applications(dApps)as serverless REST APIs.However,to engage with dApps,users require a blockchain wallet.This tool facilitates the generation and secure storage of a user’s private key and verfies their identity,among other functionalities.Despite their utility,blockchain wallets present significant challenges,such as reliance on trusted third parties,vulnerability to adversaries observing and potentially linking user interactions,key recovery issues,and synchronization of cryptographic keys across multiple devices.This paper addresses these challenges by introducing a fully decentralized multi-platform wallet that leverages blockchain and InterPlanetary File System(IPFS)technologies for managing asymmetric keys and enabling key recovery.This novel approach empowers users to interact with dApps built on blockchain smart contracts while preserving their privacy and ensuring seamless key recovery in the case of device theft or damage.The proposed system is economically viable,with in-depth cost analysis,and demonstrates resilience against security and privacy attacks.A comparative analysis highlights the advantages of the new scheme over existing mainstream and state-of-the-art solutions.Finally,a preliminary prototype implementation is presented to validate the system’s feasibility.
基金supported by the National Key Research and Development Program of China(Grant No.2020YFA0309702)the National Natural Science Foundation of China(Grant No.61502526)+1 种基金the National Safety Academic Fund(Grant No.U2130205)the Natural Science Foundation of Henan(Grant No.202300410532)。
文摘With the development of quantum computing technology,quantum public-key cryptography is gradually becoming an alternative to the existing classical public-key cryptography.This paper designs a quantum trapdoor one-way function via EPR pairs and quantum measurements.Based on this,a new quantum public-key cryptosystem is presented,which offers forward security,and can resist the chosen-plaintext attack and chosen-ciphertext attack.Compared with the existing quantum public-key cryptos,eavesdropping can be automatically detected in this new quantum public-key cryptosystem under a necessary condition,which is also detailed in the paper.
基金supported by National Natural Science Foundation of China(Grant No.61502526)。
文摘The compatibility of different quantum algorithms should be considered when these algorithms are combined.In this paper,the method of combining Grover and Simon is studied for the first time,under some preconditions or assumptions.First,we give two preconditions of applying Grover’s algorithm,which ensure that the success probability of finding the marked element is close to 1.Then,based on these two preconditions,it is found out that the success probability of the quantum algorithm for FXconstruction is far less than 1.Furthermore,we give the design method of the Oracle function,and then present the general method of combining Grover and Simon algorithm for attacking block ciphers,with success probability close to 1.
文摘To keep pace with the development of the crypto industry due to its sheer size and complex business models,the Organisation for Economic Co-operation and Development(OECD)introduced the Crypto Asset Reporting Framework(CARF)to enhance transparency in relevant transactions.It is envisaged that the introduction of CARF will facilitate the exchange of information and potentially lead to increase in tax revenues for those jurisdictions enacting such requirements in due course.In turn,industry players will need to assess the implications this will have in their business from reporting readiness and implementation perspectives.Meanwhile,the tokenisation of real-world assets(RWAs)is gaining momentum.The legal and tax implications that may arise from this latest development can be complex and uncertain.
文摘Significant improvements should be made to increase the market potential of crypto mining.However,it is not financially feasible to make too many improvements because all actions lead to cost increases.In this context,it is necessary to determine the factors that most affect this process.Accordingly,the purpose of this study is to understand the main indicators that can improve the market potential of crypto mining activities.Therefore,the main research question of this study is to identify which factors should be prioritized while generating appropriate strategies to increase these activities.In this context,a new model has been constructed to answer this question.First,significant indicators are identified based on the evaluation of the literature.After that,these factors are weighted via quantum picture fuzzy rough set-based M-SWARA.The main contribution of this study is the generation of a new decision-making model to understand the key issues related to the market potential of crypto mining activities.The M-SWARA model is taken into consideration for criteria weighting.Owing to this issue,the causal relationships between the items can be identified.The findings demonstrate that reducing energy costs emerges as the most important factor for improving the market potential of the crypto mining industry.Furthermore,technological developments also play an important role in this regard.
文摘This article discusses some major changes and developments in ac-counting standards(i.e.IFRS 15 and IFRS 16)and international taxation rules(i.e.the Two-Pillar solution under BEPS 2.0)and new business models(i.e.cryptocurrencies and Non-Fungible Tokens)which may have significant impact on taxpayers and pose challenges to tax administrations on how to provide tax certainty and better taxpayer services.The article briefly analyses the impact of these developments on taxpayers and makes suggestions for tax policymakers and tax administrations in the Belt andwww.britacom.org Road jurisdictions.
文摘The blockchain art market is partitioned around the roles of artists and collectors and highly concentrated among a few prominent figures.We hence propose to adapt Kleinberg's authority/hub HITS(Hyperlink-Induced Topic Search)method to rate artists and collectors in the art context.This seems a reasonable choice since the original method deftly defines its scores in terms of a mutual recursive relationship between authorities/artists—the miners of information/art,and hubs/collectors—the assemblers of such information/art.We evaluated the proposed method on the collector-artist network of SuperRare gallery,the major crypto art marketplace.We found that the proposed artist and collector metrics are weakly correlated with other networks science metrics like degree and strength.This hints at the possibility of coupling different measures in order to profile active users of the gallery and suggests investment strategies with different risk/reward ratios for collectors as well as marketing strategies with different targets for artists.