Filters








623 Hits in 3.0 sec

Associative Blockchain for Decentralized PKI Transparency

Xavier Boyen, Udyani Herath, Matthew McKague, Douglas Stebila
2021 Cryptography  
We present decentralized PKI transparency (DPKIT): a decentralized client-based approach to enforcing transparency in certificate issuance and revocation while eliminating single points of failure.  ...  Our technical contributions include definitions for append-only associative ledgers, a security model for certificate transparency, and a formal analysis of our DPKIT construction with respect to the same  ...  Since we are aiming for maximum transparency and decentralization, public blockchains are the most reasonable choice.  ... 
doi:10.3390/cryptography5020014 fatcat:hh2jr4hd6ncwrjvul24quoavdu

Secure Peer-to-Peer Communication Based on Blockchain [chapter]

Kahina Khacef, Guy Pujolle
2019 Primate Life Histories, Sex Roles, and Adaptability  
the blockchain, using a smart contract to verify the identities and their associated public keys, and validate the users certificate.  ...  In this paper, we explain why blockchain would make communications more secure, and we propose a model design for blockchain-based messaging maintaining the performance and security of data recorded on  ...  The Ethereum blockchain is a platform for decentralized applications called smart contracts.  ... 
doi:10.1007/978-3-030-15035-8_64 dblp:conf/aina/KhacefP19 fatcat:6ca7uyd2efaatlyrwriy5mwq2u

Current Trends in Blockchain Implementations on the Paradigm of Public Key Infrastructure: A Survey

Daniel Maldonado-Ruiz, Jenny Torres, Nour El Madhoun, Mohamad Badra
2022 IEEE Access  
In this paper, we study the current trends in the application of blockchain on the paradigm of Public Key Infrastructures (PKI).  ...  The development of these new blockchain-based solutions is grouped into a new paradigm called Blockchain 3.0 and its concepts go far beyond the well-known cryptocurrencies.  ...  decentralized ledger.  ... 
doi:10.1109/access.2022.3145156 fatcat:7w4bzmzo6re4vprq4r7usaj6yi

Privacy-aware Decentralized and Scalable Access Control Management for IoT Environment

Abrar O. Alkhamisi and Fathy Alboraei Abrar O. Alkhamisi and Fathy Alboraei
2019 journal of king abdulaziz university computing and information technology sciences  
Consequently, it maintains the trade-off between the transparency and privacy while ensuring the security for the distributed IoT environment.  ...  With the association of decentralized revocation manager in the smart contract, it prevents the resource access from the unauthorized users by dynamically generating and updating the revoked user list  ...  PKI scheme.  ... 
doi:10.4197/comp.8-1.7 fatcat:md57pr7l7vh65biamo25rkffvy

Digital Identities and Verifiable Credentials

Johannes Sedlmeir, Reilly Smethurst, Alexander Rieger, Gilbert Fridgen
2021 Business & Information Systems Engineering  
Acknowledgements We thank Jasmin Huber for compiling an identity management bibliography; we thank Alexandre Amard, Tamara Roth, and our anonymous reviewer for their valuable feedback; and we gratefully  ...  acknowledge the Luxembourg National Research Fund (FNR) and PayPal for their support of the PEARL project ''P17/IS/13342933/PayPal-FNR/Chair in DFS/Gilbert Fridgen''.  ...  ION uses verifiable credentials and a blockchain-agnostic ''sidetree'' protocol as a PKI.  ... 
doi:10.1007/s12599-021-00722-y fatcat:fhumgpmumvgubcqcrtkea5it2u

A Review on the Application of Distributed Ledgers in the Evolution of Road Transport

Gianmarco Baldini, Jose Luis Hernandez-Ramos, Gary Steri, Ricardo Neisse, Igor Nai Fovino
2020 IEEE Internet Computing  
Through this analysis, we additionally provide a set of potential research directions and ways forward to exploit the advantages of DLTs in C-ITS and AV in terms of decentralized trust and transparency  ...  In recent years, distributed ledger technologies (DLTs) and blockchain have become disruptive technologies to support distributed and trusted sharing ecosystems in various domains.  ...  The characteristics described above make DLT/blockchain particularly appealing for what concerns their decentralization, transparency, and more in general, an enhanced level of data integrity, which is  ... 
doi:10.1109/mic.2020.3023295 fatcat:4ieyiwbm55aurbljqpllzwxdtm

A BLOCK CHAIN-BASED ACCESS CONTROL FRAMEWORK FOR BIG DATA

Monika S., Navashree P., Mr.S.Vivekanandan, M.E
2021 IJARCCE  
, which provides lightweight and decentralized access control security for an IoT system.  ...  Introduce a framework for data sharing and access control to address this problem by implementing decentralized storage.  ... 
doi:10.17148/ijarcce.2021.10458 fatcat:aseht4dzhzh3hkjuxxrlo4w2oq

CertLedger: A New PKI Model with Certificate Transparency Based on Blockchain [article]

Murat Yasin Kubilay, Mehmet Sabir Kiraz, Haci Ali Mantar
2018 arXiv   pre-print
In this paper, we propose a new PKI architecture with certificate transparency based on blockchain, what we called CertLedger, to eliminate the split-world attacks and to provide an ideal certificate/revocation  ...  In conventional PKI, CAs are assumed to be fully trusted. However, in practice, CAs' absolute responsibility for providing trustworthiness caused major security and privacy issues.  ...  Keywords: PKI; SSL/TLS; Certificate Transparency; Certificate validation; Blockchain 1.  ... 
arXiv:1806.03914v2 fatcat:jcsbujoy5nbbze5ae7uhp45n7m

ETHERST: Ethereum-Based Public Key Infrastructure Identity Management with a Reward-and-Punishment Mechanism

Chong-Gee Koa, Swee-Huay Heng, Ji-Jian Chin
2021 Symmetry  
Blockchain-based PKI integrates blockchain technology with PKI to form a new type of decentralized PKI (DPKI).  ...  Symmetric or asymmetric encryption schemes are widely used in identity authentication in any kind of PKI. The conventional PKI has several drawbacks due to the centralized and non-transparent design.  ...  The authors leveraged the advantages of immutability, transparency and decentralization of blockchain to implement a decentralized PKI with identity retention.  ... 
doi:10.3390/sym13091640 fatcat:z27prkrpnjfxxfztj7zmjripbu

Identity and Access Management for the Internet of Things

P. Renee Carnley, the Beacom College of Computer & Cyber Sciences, Dakota State University, Madison, South Dakota 57042 USA, Houssain Kettani
2019 International Journal of Future Computer and Communication  
Blockchain technologies combined with PKI can be utilized in such a way as to provide an identity and access management solution for the internet of things (IoT).  ...  Index Terms-Blockchain technology, cloud computing, Identity and Access Management (IAM), Internet of Things (IoT), Public Key Infrastructure (PKI), Radio Frequency Identification (RFID), smart card. summer  ...  Basically, they are online ledgers that provide decentralized and transparent data sharing [19] . Blockchains are the technology behind bitcoins that have been successfully used in E-commerce.  ... 
doi:10.18178/ijfcc.2019.8.4.554 fatcat:hiu5jk73hrhyxc7fkhfcnnucgu

BlockPGP: A Blockchain-based Framework for PGP Key Servers

Alexander Yakubov, Wazen Shbair, Nida Khan, Radu State, Christophe Medinger, Jean Hilger
2020 International Journal of Networking and Computing  
However, following the implementation of PKI log-based infrastructure solutions like Google's Certificate Transparency, the security challenges of PGP key servers became apparent, including MITM risks  ...  BlockPGP: A Blockchain-based Framework for PGP Key Servers certificate identity confirmation known as "Web of Trust".  ...  With the advantages of potential blockchain solutions in PKI compared even to advanced Certificate Transparency, it is important to research the options of blockchain implementations for PGP key servers  ... 
doi:10.15803/ijnc.10.1_1 fatcat:mfk4zeb5wzcfjeptquxevzrvnu

A Survey on Blockchain-based Identity Management and Decentralized Privacy for Personal Data

Komal Gilani, Emmanuel Bertin, Julien Hatin, Noel Crespi
2020 2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)  
Firstly, we discussed an overview of Identity management approaches, introducing an architecture overview as well as the relevant actors in such a system and blockchain technology as solution for distributed  ...  Service providers collect and store information that is used for data mining, profiling and exploitation without users' knowledge or consent.  ...  PGP approach for revocation of keys and signature is utilized. In [38] , PKI called Claim-Chain based on decentralized key distribution system called is proposed.  ... 
doi:10.1109/brains49436.2020.9223312 dblp:conf/brains/GilaniBHC20 fatcat:bqud3palbncrxetmx7g444qrk4

Study of Blockchain Technology Applied to International Marketing and Potential Business Disruptions

Pradip Waykos, Prof. Dr. Satish N. Pawar
2022 International Journal of Research Publication and Reviews  
Objective of this paper is to draft the applications of blockchain in the future of international marketing. How Blockchain can help the global business environment to cope with diverse parameters.  ...  On the other hand, like the Internet, the advent of Blockchain technology is likely to disrupt international marketing forte with its capabilities of distributed ledger technology, Smart Contracts and  ...  In ideal terms, blockchain advocates a decentralized, transparent, and more democratic version of the Internet.  ... 
doi:10.55248/gengpi.2022.3.8.15 fatcat:7hvco2gfeja2ppgtxqlimyetsi

E-Voting System Using Hyperledger Fabric Blockchain and Smart Contracts

Javier Díaz-Santiso, Paula Fraga-Lamas
2021 Engineering Proceedings  
This article presents the design and implementation of a decentralized e-voting system that has the potential to provide a higher level of transparency, security, and cost-efficiency.  ...  Hyperledger Fabric blockchain and smart contracts are used to cast votes, which are then recorded in an immutable way, giving voters anonymity and trust in the fairness of the election process.  ...  In view of the preliminary results, it is clear that blockchain fulfilled requirements for e-voting schemes like transparency, consistency, and resiliency.  ... 
doi:10.3390/engproc2021007011 fatcat:t6cd3ftebjc7pltzfyuxvfukja

BLOCKCHAIN-BASED DECENTRALIZED USER AUTHENTICATION SCHEME FOR LETTER OF GUARANTEE IN FINANCIAL CONTRACT MANAGEMENT

Sasikumar A., Karthikeyan B, Arunkumar S., Saravanan P., Subramaniyaswamy V, Logesh Ravi
2022 Malaysian Journal of Computer Science  
The use of blockchain technology in the financial contract management system leads many challenges for user authentication and key distribution.  ...  The proposed user authentication is developed based on the deterministic encryption algorithm to achieve decentralized security for trusted data transmission.  ...  These types of transactions are public blockchain based model to improve security and transparency. In these networks are decentralized to improve the security of each user associated with nodes.  ... 
doi:10.22452/mjcs.sp2022no1.5 fatcat:sdmezqi6xbdqhisdlugtvu2lzi
« Previous Showing results 1 — 15 out of 623 results