Filters








353 Hits in 4.4 sec

Mithril: Stake-based Threshold Multisignatures [article]

Pyrros Chaidos, Aggelos Kiayias
2021 IACR Cryptology ePrint Archive  
In this work we put forth a new stake-based primitive, stake-based threshold multisignatures (STM, or "Mithril" signatures), which allows the aggregation of individual signatures into a compact multisignature  ...  This is achieved by having for each message a pseudorandomly sampled subset of participants eligible to issue an individual signature; this ensures the scalability of signing, aggregation and verification  ...  Merkle trees A Merkle tree is a well-used data structure based on hash functions that allows one to represent N items 3 of arbitrary size by one hash value.  ... 
dblp:journals/iacr/ChaidosK21 fatcat:t774dzuyuvdujgx3eqbz56kowa

A noise tolerant and schema-agnostic blocking technique for entity resolution

Tiago Brasileiro Araújo, Carlos Eduardo Santos Pires, Demetrio Gomes Mestre, Thiago Pereira da Nóbrega, Dimas Cassimiro do Nascimento, Kostas Stefanidis
2019 Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing - SAC '19  
NA-BLOCKER applies Locality Sensitive Hashing (LSH) to hash the attribute values of entities and enable the generation of high-quality blocks, even with the presence of noise in the attribute values.  ...  In our experimental evaluation, we use five real-world datasets, and highlight that NA-BLOCKER presents better results regarding effectiveness compared to the state-of-the-art technique.  ...  Notice that the hash function always generates signatures with the same size, in terms of elements. After defining the signatures, the blocks are generated based on each of the signatures.  ... 
doi:10.1145/3297280.3299730 dblp:conf/sac/AraujoPMNNS19 fatcat:c3hxvzc25bannfjlwvyy7ovup4

Real-time visualization of network attacks on high-speed links

Hyogon Kim, Inhye Kang, Saewoong Bahk
2004 IEEE Network  
A simple but novel idea of plotting a packet using its source IP address, destination IP address, and the destination port in a 3-dimensional space graphically reveals ongoing attacks.  ...  This article shows that malicious traffic flows such as denial-of-service attacks and various scanning activities can be visualized in an intuitive manner.  ...  Acknowledgments The original idea of classifying the attacks using the threepacket header values is attributed to Heejung Sohn.  ... 
doi:10.1109/mnet.2004.1337733 fatcat:4xthfneo5vhfplacr4g65jncoe

Topos: A Secure, Trustless, and Decentralized Interoperability Protocol [article]

Théo Gauthier, Sébastien Dan, Monir Hadji, Antonella Del Pozzo, Yackolley Amoussou-Guenou
2022 arXiv   pre-print
The interface between the TCE and subnets leverages the ICE-FROST protocol, an innovative threshold signature scheme, whose static public key allows for uniquely identifying subnets after they register  ...  for global adoption and a new standard for the Internet base layer.  ...  Acknowledgements We would like to thank Sara Tucci-Piergiovanni and Thibault Rieutord at the CEA List and Robin Salen, Travis Baumbaugh, Alonso Gonzalez, and Hamy Ratonanina, our colleagues at Toposware  ... 
arXiv:2206.03481v1 fatcat:naahhvqfxjh6hmacyoqfjeoyay

Privacy-preserving solutions for Blockchain: review and challenges

Jorge Bernal Bernabe, Jose L. Canovas, Jose L. Hernandez-Ramos, Rafael Torres Moreno, Antonio Skarmeta
2019 IEEE Access  
To deal with these challenges, novel privacy-preserving solutions for blockchain based on crypto-privacy techniques are emerging to empower users with mechanisms to become anonymous and take control of  ...  Bitcoin and Ethereum, as well as privacy-preserving research proposals and solutions in permissioned and private blockchains. Diverse blockchain scenarios are analyzed,  ...  Privacy is addressed using threshold ring signatures and Combined Public Keys (CPK) [225] . Summary and analysis of current trends.  ... 
doi:10.1109/access.2019.2950872 fatcat:kf2rl7onmrbvnozjudspxrcatu

Proof-of-Stake Sidechains

Peter Gazi, Aggelos Kiayias, Dionysis Zindros
2019 2019 IEEE Symposium on Security and Privacy (SP)  
We show how ATMS can be securely instantiated by regular and aggregate digital signatures as well as succinct arguments of knowledge such as STARKs and bulletproofs with varying degrees of storage efficiency  ...  As an exemplary concrete instantiation we present our construction for an epoch-based PoS system consistent with Ouroboros (Crypto 2017), the PoS blockchain protocol used in Cardano which is one of the  ...  avk was created using the right sequence of individual public keys; and (3) aggregate t ≥ t individual signatures from t of the parties into a single aggregate signature that can then be verified using  ... 
doi:10.1109/sp.2019.00040 dblp:conf/sp/GaziKZ19 fatcat:2hzyiyhenbervklja5rxnhfsh4

On handling insider attacks in wireless sensor networks

Christoph Krauß, Markus Schneider, Claudia Eckert
2008 Information Security Technical Report  
Proposed approaches usually apply threshold-based mechanisms to filter such messages out.  ...  Usually a redundancy-based approach is used where a report is only valid if it has been collaboratively generated by multiple sensor nodes.  ...  Another simple example for a threshold-based intrusion tolerant mechanism is the above described use of the MEDIAN instead of the AVERAGE in an aggregation scenario.  ... 
doi:10.1016/j.istr.2008.10.011 fatcat:d4bh3jwjp5c7vg6fcn7q5b45ly

Towards Improving the Performance of BFT Consensus For Future Permissioned Blockchains [article]

Manuel Bravo and Zsolt István and Man-Kit Sit
2020 arXiv   pre-print
Examples include country-wide networks, such as Alastria, or those deployed using cloud-based platforms such as IBM Blockchain Platform.  ...  Through this we explore the benefits of various common optimization strategies and show that the protocol is unlikely to saturate more than 10Gbps networks without relying on specialized hardware-based  ...  ACKNOWLEDGMENTS This project has received funding from the European Unions Horizon 2020 research and innovation program, under the Marie Sklodowska-Curie grant agreement No. 842956, and the Spanish Research  ... 
arXiv:2007.12637v1 fatcat:ln2rmxjczffsjbbtx4hud5noqq

SoK: Decentralized Randomness Beacon Protocols [article]

Mayank Raikwar, Danilo Gligoroski
2022 arXiv   pre-print
To the best of our knowledge, no systematic and comprehensive work systematizes and analyzes the existing DRB protocols.  ...  This SoK tries to fill that gap by providing basic standard definitions and requirements for DRB protocols, such as Unpredictability, Bias-resistance, Availability (or Liveness), and Public Verifiability  ...  A VDF is run on a seed s from a block hash to compute the DRB output and a proof is computed using the STARK prover.  ... 
arXiv:2205.13333v1 fatcat:gzqcwmq5yrekpcuraqkrn56xee

Blockchain Technologies for the Internet of Things: Research Issues and Challenges

Mohamed Amine Ferrag, Makhlouf Derdour, Mithun Mukherjee, Abdelouahid Derhab, Leandros Maglaras, Helge Janicke
2018 IEEE Internet of Things Journal  
, cryptanalytic attacks, reputation-based attacks, and service-based attacks.  ...  Based on the current survey, we highlight open research challenges and discuss possible future research directions in the blockchain technologies for IoT.  ...  BSeIn [39] , on the other hand, uses the idea of attribute-based signatures, i.e., only legitimate terminals can generate a valid signature, and hence any impersonation attempt will be detected when its  ... 
doi:10.1109/jiot.2018.2882794 fatcat:xt2oh3dmozgrjg3n42xsdgm7f4

DoS and DDoS in Named-Data Networking [article]

Paolo Gasti, Gene Tsudik, Ersin Uzun, Lixia Zhang
2012 arXiv   pre-print
After identifying and analyzing several new types of attacks, it investigates their variations, effects and counter-measures.  ...  Although they vary in maturity and scope, in order to avoid past pitfalls, these efforts seek to treat security and privacy as fundamental requirements.  ...  However, a router should monitor collective (aggregated) consumer feedback and act whenever its volume exceeds some threshold.  ... 
arXiv:1208.0952v2 fatcat:ronnyrqdjfc57gmcnal3pt6lg4

Application of Bitcoin Data-Structures & Design Principles to Supply Chain Management [article]

S. Matthew English, Ehsan Nezhadian
2017 arXiv   pre-print
Accordingly the potential useful applications of this technology have been largely inflated.  ...  This work sidesteps the question of what constitutes a blockchain as such and focuses on the architectural components of the Bitcoin cryptocurrency, insofar as possible, in isolation.  ...  threshold.  ... 
arXiv:1703.04206v1 fatcat:y6opqrd6wrd6ddrhdymmoerjxq

Deduplicating Training Data Makes Language Models Better [article]

Katherine Lee, Daphne Ippolito, Andrew Nystrom, Chiyuan Zhang, Douglas Eck, Chris Callison-Burch, Nicholas Carlini
2022 arXiv   pre-print
Deduplication allows us to train models that emit memorized text ten times less frequently and require fewer train steps to achieve the same or better accuracy.  ...  We find that existing language modeling datasets contain many near-duplicate examples and long repetitive substrings.  ...  Acknowledgements We are grateful to the many researchers whose technical help, feedback, and discussions shaped this project: Jacob Austin, Samy Bengio, Olivier Bousquet, James Bradbury, Fernando Diaz,  ... 
arXiv:2107.06499v2 fatcat:lmfcwiia4baq5diagwrlgbx6ci

Privacy and Integrity Preserving Computations with CRISP [article]

Sylvain Chatel, Apostolos Pyrgelis, Juan R. Troncoso-Pastoriza, Jean-Pierre Hubaux
2021 arXiv   pre-print
We evaluate our solution on different use cases such as smart-metering, disease susceptibility, and location-based activity tracking, thus showing its versatility.  ...  Based on lattice-based homomorphic encryption and commitments, as well as zero-knowledge proofs, our construction enables a service provider to process and reuse third-party signed data in a privacy-friendly  ...  We are also grateful to Henry Corrigan-Gibbs, Wouter Lueks, and the members of the EPFL Laboratory for Data Security for their helpful comments and suggestions.  ... 
arXiv:2007.04025v4 fatcat:oyies26u2jhxtf4kywovec4ssm

STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System [article]

Josh Benaloh and Mike Byrne and Philip Kortum and Neal McBurnett and Olivier Pereira and Philip B. Stark and Dan S. Wallach
2012 arXiv   pre-print
The human interface and process flow is based on modern usability research.  ...  It provides both a paper trail and end-to-end cryptography using COTS hardware. It is designed to support both ballot-level risk-limiting audits, and auditing by individual voters and observers.  ...  At the end of the election, any set of trustees that achieve the pre-set quorum threshold use their respective private keys to decrypt the derived aggregate tally encryption.  ... 
arXiv:1211.1904v1 fatcat:pvtsvlmarvb7njvxoe3iwub5uu
« Previous Showing results 1 — 15 out of 353 results