Open Access. Powered by Scholars. Published by Universities.®

Finance and Financial Management Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Finance and Financial Management

The Future Of Cryptocurrency And Blockchain Technology In Finance, Wanyi Wong, Alan @ Ali Madjelisi Megargel Aug 2023

The Future Of Cryptocurrency And Blockchain Technology In Finance, Wanyi Wong, Alan @ Ali Madjelisi Megargel

Research Collection School Of Computing and Information Systems

Cryptocurrencies have been all the rage in recent years, with many being drawn to their appeal as speculative investment assets. Its proponents also champion the secure and decentralised nature of the technology it is based on, called the blockchain. Given the secure nature of blockchain technology, the idea of adopting cryptocurrencies as legal tender currency has also been mooted and experimented with – with the most famous example being the Central American nation of El Salvador’s bold move to adopting the cryptocurrency Bitcoin as legal tender in September 2021. In theory, this would provide a solution to the high transaction …


Secure Hierarchical Deterministic Wallet Supporting Stealth Address, Xin Yin, Zhen Liu, Guomin Yang, Guoxing Chen, Haojin Zhu Sep 2022

Secure Hierarchical Deterministic Wallet Supporting Stealth Address, Xin Yin, Zhen Liu, Guomin Yang, Guoxing Chen, Haojin Zhu

Research Collection School Of Computing and Information Systems

Over the past decade, cryptocurrency has been undergoing a rapid development. Digital wallet, as the tool to store and manage the cryptographic keys, is the primary entrance for the public to access cryptocurrency assets. Hierarchical Deterministic Wallet (HDW), proposed in Bitcoin Improvement Proposal 32 (BIP32), has attracted much attention and been widely used in the community, due to its virtues such as easy backup/recovery, convenient cold-address management, and supporting trust-less audits and applications in hierarchical organizations. While HDW allows the wallet owner to generate and manage his keys conveniently, Stealth Address (SA) allows a payer to generate fresh address (i.e., …


Traceable Monero: Anonymous Cryptocurrency With Enhanced Accountability, Yannan Li, Guomin Yang, Wily Susilo, Yong Yu, Man Ho Au, Dongxi Liu Mar 2021

Traceable Monero: Anonymous Cryptocurrency With Enhanced Accountability, Yannan Li, Guomin Yang, Wily Susilo, Yong Yu, Man Ho Au, Dongxi Liu

Research Collection School Of Computing and Information Systems

Monero provides a high level of anonymity for both users and their transactions. However, many criminal activities might be committed with the protection of anonymity in cryptocurrency transactions. Thus, user accountability (or traceability) is also important in Monero transactions, which is unfortunately lacking in the current literature. In this paper, we fill this gap by introducing a new cryptocurrency named Traceable Monero to balance the user anonymity and accountability. Our framework relies on a tracing authority, but is optimistic, in that it is only involved when investigations in certain transactions are required. We formalize the system model and security model …


Blockchain-Based Public Auditing And Secure Deduplication With Fair Arbitration, Haoran Yuan, Xiaofeng Chen, Jianfeng Wang, Jiaming Yuan, Hongyang Yan, Willy Susilo Dec 2020

Blockchain-Based Public Auditing And Secure Deduplication With Fair Arbitration, Haoran Yuan, Xiaofeng Chen, Jianfeng Wang, Jiaming Yuan, Hongyang Yan, Willy Susilo

Research Collection School Of Computing and Information Systems

Data auditing enables data owners to verify the integrity of their sensitive data stored at an untrusted cloud without retrieving them. This feature has been widely adopted by commercial cloud storage. However, the existing approaches still have some drawbacks. On the one hand, the existing schemes have a defect of fair arbitration, i.e., existing auditing schemes lack an effective method to punish the malicious cloud service provider (CSP) and compensate users whose data integrity is destroyed. On the other hand, a CSP may store redundant and repetitive data. These redundant data inevitably increase management overhead and computational cost during the …


Quantum Consensus, Jorden Seet, Paul Griffin Dec 2019

Quantum Consensus, Jorden Seet, Paul Griffin

Research Collection School Of Computing and Information Systems

In this paper, we propose a novel consensus mechanism utilizing the quantum properties of qubits. This move from classical computing to quantum computing is shown to theoretically enhance the scalability and speed of distributed consensus as well as improve security and be a potential solution for the problem of blockchain interoperability. Using this method may circumvent the common problem known as the Blockchain Trilemma, enhancing scalability and speed without sacrificing de-centralization or byzantine fault tolerance. Consensus speed and scalability is shown by removing the need for multicast responses and exploiting quantum properties to ensure that only a single multicast is …


Picking Flowers In An Ico Garden, Fam Guo Teng, Paul R. Griffin, Andrew Koh Mar 2019

Picking Flowers In An Ico Garden, Fam Guo Teng, Paul R. Griffin, Andrew Koh

Research Collection School Of Computing and Information Systems

The rise of Initial Coin Offerings (ICO) in recent times and their potential for investment opportunities have investors spending a lot of time researching ICOs or having to follow the crowd. This paper aims to explore four broad factors of ICOs: identity, credibility, investor sentiment, and price movement to develop a framework that is useful in determining ICO quality. Research is shown using data sources including public forums, chat groups, web sites, white papers as well as smart contract details. Finally, a system, based on the framework, is proposed that can be used to detect and regulate ICO activities and …