7,713 Hits in 2.5 sec

Blockchain using Proof-of-Interaction [article]

Jean-Philippe Abegg , Thomas Noel
2020 arXiv   pre-print
This paper we define a new Puzzle called Proof-of-Interaction and we show how it can replace, in the Bitcoin protocol, the Proof-of-Work algorithm.  ...  This mechanism has not yet been used in the Blockchain context, and is at the core of our new Proof-of-Interaction.  ...  The main idea to understand how the Proof-of-Interaction can be used in a Blockchain context is the following.  ... 
arXiv:2002.07763v1 fatcat:wqqb3ttmirarnhlbde4wocm7fy

Privacy-Preserving Traffic Management: A Blockchain and Zero-Knowledge Proof Inspired Approach

Wanxin Li, Hao Guo, Mark Nejad, Chien-Chung Shen
2020 IEEE Access  
In addition, the tamper-proof nature of the blockchain ensures the integrity of the traffic data.  ...  It allows replacing the interactive step 3) in Scheme Version 1 with a non-interactive random oracle function. In practice, we can use a cryptographic hash function [26] instead.  ... 
doi:10.1109/access.2020.3028189 fatcat:dy3z5ndylbchfex2xwqiysjtwu


Liz George, Jubilant J. Kizhakkethottam
2021 Zenodo  
This article explores the significance of the data privacy aspect provided by both ZKP and Homomorphic Encryption and how it can be effectively used to improvise the privacy of blockchain applications  ...  Homomorphic Encryption and Zero Knowledge Proofs are two trending concepts that are widely popular as data privacy preservation techniques in a wide variety of applications, especially in those associated  ...  ZKP in Blockchain Applications: Different types of Zero Knowledge proofs are being used in Blockchain applications depending upon the requirements specified.  ... 
doi:10.5281/zenodo.4620541 fatcat:fkyebubxlnhc3kd4evp2vifs2u

A Service-Oriented Perspective on Blockchain Smart Contracts

Florian Daniel, Luca Guida
2019 IEEE Internet Computing  
For example, a smart contract may be used to automatically release a given amount of cryptocurrency upon the satisfaction of a condition agreed on by two partners.  ...  A consensus protocol enables the nodes of the blockchain network to create trust in the state of the log and makes blockchains inherently resistant to tampering [3] .  ...  Ethereum uses a message-based protocol supporting the following interaction features: • Transactions are used by blockchain clients (the users of the blockchain) to create new contracts or to invoke existing  ... 
doi:10.1109/mic.2018.2890624 fatcat:lsebaq7wffetnkng2c4gcqgzne

Non-interactive Zero-knowledge for Blockchain: A Survey

Juha Partala, Tri Hong Nguyen, Susanna Pirttikangas
2020 IEEE Access  
ACKNOWLEDGEMENTS DECLARATION OF INTERESTS Declarations of interest: none  ...  ZERO-KNOWLEDGE PROOFS Non-interactive zero-knowledge proofs are the main building blocks for privacy on the blockchain.  ...  They presented a novel approach called "proofs-for-muggles" that works for a large class of problems. These proofs can be made non-interactive using the transformation of Kalai et al.  ... 
doi:10.1109/access.2020.3046025 fatcat:crl77kezmbfydhtvvv6i3lrzdi

A Regulatable Data Privacy Protection Scheme for Energy Transactions Based on Consortium Blockchain

Yufeng Li, Yuling Chen, Tao Li, Xiaojun Ren, Chien Ming Chen
2021 Security and Communication Networks  
Finally, the multibase decomposition method is used to improve the decryption efficiency of the supervisor.  ...  First, the concealment of the transaction amount is realized by Pedersen commitment and Bulletproof range proof.  ...  It uses zeroknowledge proof technology to generate range proof and regulatory proof for each transaction. e range proof is verified by the public node, which is used to guarantee the range of the user's  ... 
doi:10.1155/2021/4840253 fatcat:dirzfla3rbapplfiumzfp5uwt4

Privacy-aware Decentralized and Scalable Access Control Management for IoT Environment

Abrar O. Alkhamisi and Fathy Alboraei Abrar O. Alkhamisi and Fathy Alboraei
2019 journal of king abdulaziz university computing and information technology sciences  
The design of the proposed architecture incorporates three main components such as the contextual blockchain gateway, decentralized revocation manager, and non-interactive zero-knowledge proof based validation  ...  Moreover, the proposed architecture employs the non-interactive zeroknowledge proof cryptographic protocol to ensure the transaction privacy within the smart contract.  ...  With the assistance of non-interactive zeroknowledge proof protocol, the proposed approach hides the transaction information among the nodes in the blockchain network.  ... 
doi:10.4197/comp.8-1.7 fatcat:md57pr7l7vh65biamo25rkffvy

BLOSOM : Blockchain technology for security of medical records

Rahul Johari, Vivek Kumar
2021 ICT Express  
In the current research work Blockchain containers running on multiple ports are proposed to be used for holding patient's medical records.  ...  The proposed Blockchain Algorithm consisting of cryptographic hash of the records, proof of work and a Merkle tree formulation were simulated in Python and the results have been positive and encouraging  ...  Blockchain works on proof of work time stamping scheme. In [1] author(s) lists some of the popular and widely used Blockchain technology tools.  ... 
doi:10.1016/j.icte.2021.06.002 fatcat:vmi646aenngxxnuevkuk3vuvja

PrivChain: Provenance and Privacy Preservation in Blockchain enabled Supply Chains [article]

Sidra Malik, Volkan Dedeoglu, Salil Kanhere, Raja Jurdak
2021 arXiv   pre-print
A proof of concept implementation on Hyperledger Fabric reveals a minimal overhead of using PrivChain for blockchain enabled supply chains.  ...  In this work, we propose a privacy-preservation framework, PrivChain, to protect sensitive data on blockchain using zero knowledge proofs.  ...  Depending on the requirement of interactions between the prover and the verifier, ZKPs are interactive or non-interactive.  ... 
arXiv:2104.13964v1 fatcat:djgtsh773vgqbcp2zwh7kv66zq

"Blockchain Research in Information Systems: Current Trends and an Inclusive Future Research Agenda"

Matti Rossi, Aalto University, Finland, Christoph Mueller-Bloch, Jason Bennett Thatcher, Roman Beck, IT University of Copenhagen, Denmark, University of Alabama, USA, IT University of Copenhagen, Denmark
2019 Journal of the AIS  
Our research agenda emphasizes issues of blockchain governance, human and material agency, blockchain affordances and constraints, as well as the consequences of its use.  ...  First, we direct the attention of IS research toward the blockchain protocol level, which is characterized by recursive interactions between human agents and the blockchain protocol.  ...  We also thank Yannis Bakos, Nicholas Garcia, Hanna Halaburda, and Natalia Levina for providing valuable comments on earlier drafts of the manuscript. All authors contributed equally to this work.  ... 
doi:10.17705/1jais.00571 fatcat:ew76teldxvhk7kkposefm43cuy

A study on blockchain technology

P S. G. Aruna Sri, D Lalitha Bhaskari
2018 International Journal of Engineering & Technology  
Blockchain is a one of emerging technology for decentralized and sharing of transactional data across a large peer to peer network, where non-trusting members can interact with each other without an intermediary  ...  In this paper, we review the basics of Blockchain, its applications, types, and working of Blockchain.  ...  Proof of activity (PoA) PoA approach has combined the algorithms of Proof of Work and Proof of Stake. For initial mining Proof of work is used and Proof of stake for new blocks.  ... 
doi:10.14419/ijet.v7i2.7.10757 fatcat:du4ytngw3bgnvedfijmwklbcqu

Blockchain Technology Consensus Algorithms and Applications: A Survey

Samar Alsaqqa, Sufyan Almajali
2020 International Journal of Interactive Mobile Technologies  
<p class="0abstract">One of the new promising technologies for the future is blockchain.  ...  Furthermore, the study gives an insight into the latest adoption of the blockchain in the real world.</p>  ...  In proof of work, a massive amount of energy is consumed and huge computing power is used which will spend a big amount of resources on the blockchain while using proof of stake consensus algorithm there  ... 
doi:10.3991/ijim.v14i15.15893 fatcat:tqcjqol5vfds5najefiamvxeb4

Blockchain-enabled Identity Verification for Safe Ridesharing Leveraging Zero-Knowledge Proof [article]

Wanxin Li, Collin Meese, Hao Guo, Mark Nejad
2020 arXiv   pre-print
To this end, we propose a novel privacy-preserving identity verification system, extending zero-knowledge proof (ZKP) and blockchain for use in ridesharing applications.  ...  We design a permissioned blockchain network to perform the ZKP verification of a driver's identity, which also acts as an immutable ledger to store ride logs and ZKP records.  ...  The system consists of two primary portions that interact seamlessly: the ZKP module and the blockchain network. The ZKP module is programmed by using the Hyperledger Ursa library [14] .  ... 
arXiv:2010.14037v3 fatcat:hk6ednljyre6rpyibwdbvegkza

The Blockchain as a Software Connector

Xiwei Xu, Cesare Pautasso, Liming Zhu, Vincent Gramoli, Alexander Ponomarev, An Binh Tran, Shiping Chen
2016 2016 13th Working IEEE/IFIP Conference on Software Architecture (WICSA)  
Additionally, we explore specific implications of using the blockchain as a software connector including design trade-offs regarding quality attributes.  ...  Based on our experience in several projects using blockchain, in this paper we provide rationales to support the architectural decision on whether to employ a decentralized blockchain as opposed to other  ...  ACKNOWLEDGMENTS NICTA is funded by the Australian Government through the Department of Communications and the Australian Research Council through the ICT Centre of Excellence Program.  ... 
doi:10.1109/wicsa.2016.21 dblp:conf/wicsa/XuPZGPTC16 fatcat:hexjjfxgxzdblafrqzkrzhgcw4

False Expenditure Prevention Using Blockchain

Harshit Khanna, Jasneet Singh Bhatia, Mayank Gupta
2020 International Journal of Scientific Research in Computer Science Engineering and Information Technology  
Blockchain is one of the latest disruptive technologies in the market.  ...  Primarily known for cryptocurrencies, it is now being used for various other applications that utilize the integrity and distributed mechanism employed by the blockchain technology.  ...  and smart contracts. mechanisms , such as PoB (Proof of Bandwidth), PoET (Proof of Elapsed Time) , PoA(Proof of Authority) and so on, are also used in some blockchain systems.  ... 
doi:10.32628/cseit206524 fatcat:hua7bdscezbq3jz6ng3jjuijnm
« Previous Showing results 1 — 15 out of 7,713 results