MoneroResearch.info

WIKINDX Resources

Duan, J., Wang, W., Wang, L., & Gu, L. (2025). Transitioning RingCT Accounts: From Classical to Post-Quantum Security, IEEE Internet of Things Journal, 12(2), 2090–2105. 
Added by: Rucknium (16/04/2025, 15:10)   
Resource type: Journal Article
DOI: 10.1109/JIOT.2024.3466905
ID no. (ISBN etc.): 2327-4662
BibTeX citation key: anon2025a
View all bibliographic details
Categories: Monero-focused
Keywords: Protocols;Security;Blockchains;Privacy;Qubit;Public key;Internet of Things;Blockchain;commitment;post-quantum;ring confidential transactions (RingCT);transition
Creators: Duan, Gu, Wang, Wang
Collection: IEEE Internet of Things Journal
Views: 80/80
Attachments   URLs   https://ieeexplore ... /document/10690176
Abstract
Ring confidential transactions (RingCT) is a classical protocol that enhances transaction privacy within blockchain technology. It is primarily utilized in anonymous cryptocurrencies such as Monero. In recent years, to counter the security threats posed by quantum computing to classical RingCT (C-RCT), several post-quantum RingCT (P-RCT) protocols were proposed. However, prior studies do not address the account transition from C-RCT to P-RCT, which is essential to ensure the quantum resistance and usability of user accounts following the upgrade from C-RCT to P-RCT. In this article, we introduce a RingCT account transition protocol (RAT), which allows users to migrate their accounts from the blockchain with C-RCT to that with P-RCT. The protocol consists of two cryptographic components: 1) a zero-knowledge proof scheme used to prove that two group generators correspond to the same witness and 2) a cross-cryptosystems commitment transition protocol. RAT is fully decentralized and does not require any trusted third parties. Additionally, the transition process does not disclose the account balance and maintains both atomicity and consistency. The security of our protocol relies on the cryptographic components within RingCT, without the need for additional security assumptions, such as a trusted setup. The experimental results demonstrate the effectiveness of our protocol in practice.
Added by: Rucknium  
WIKINDX 6.10.2 | Total resources: 259 | Username: -- | Bibliography: WIKINDX Master Bibliography | Style: APA Enhanced