A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Public Accountability vs. Secret Laws: Can They Coexist?
2017
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society - WPES '17
Our scheme can be directly instantiated on the Ethereum blockchain (and a simplified version with weaker guarantees can be instantiated with Bitcoin). ...
Post 9/11, journalists, scholars and activists have pointed out that secret laws -a body of law whose details and sometime mere existence is classified as top secret -were on the rise in all three branches ...
However, it is also very important in the context of businesses which hold secret information about business practices (this is desirable since the ability to keep trade secrets can benefit the economy ...
doi:10.1145/3139550.3139565
dblp:conf/wpes/GoldwasserP17
fatcat:4o3pw7do4rclljtbfxxorlimda
SHARVOT: secret SHARe-based VOTing on the blockchain
[article]
2018
arXiv
pre-print
In particular, we introduce a secret share-based voting system on the blockchain, the so-called SHARVOT protocol. ...
In this paper, we discuss possible uses of the blockchain technology to implement a secure and fair voting system. ...
The dealer also publishes the public keys P A and P B while keeping k A and k B private. ...
arXiv:1803.04861v1
fatcat:ffkoj6shyzcx3kwh3svuvp2a64
Scalable Byzantine Consensus via Hardware-assisted Secret Sharing
2018
IEEE transactions on computers
However, existing BFT protocols can only scale to tens of nodes due to their O(n^2) message complexity. In this paper, we propose FastBFT, a fast and scalable BFT protocol. ...
At the heart of FastBFT is a novel message aggregation technique that combines hardware-based trusted execution environments (TEEs) with lightweight secret sharing primitives. ...
ACKNOWLEDGMENTS The work was supported in part by a grant from NEC Labs Europe as well as funding from the Academy of Finland (BCon project, grant #309195). ...
doi:10.1109/tc.2018.2860009
fatcat:ck3bjy6j4rhntf7m4ecwycw7ua
Recoverable Private Key Scheme for Consortium Blockchain Based on Verifiable Secret Sharing
2021
KSII Transactions on Internet and Information Systems
We propose a recoverable private key scheme for consortium blockchain based on the verifiable secret sharing which can enable the user's private key in the consortium blockchain to be securely recovered ...
through a verifiable secret sharing method. ...
As a distributed shared ledger and database, the blockchain can enable peers to establish a trusted distributed system without mutual trust. ...
doi:10.3837/tiis.2021.08.009
fatcat:bac7mz4rdfdmle73wtbiyu7vqm
The Blockchain Based Auditor on Secret key Life Cycle in Reconfigurable Platform
[article]
2020
arXiv
pre-print
In this article, we have proposed and implemented an isolated secret key memory which can log life cycle of secret keys cryptographically using blockchain (BC) technology. ...
The growing sophistication of cyber attacks, vulnerabilities in high computing systems and increasing dependency on cryptography to protect our digital data make it more important to keep secret keys safe ...
It is to be noted that blockchain data is written in main memory which can be accessed by the PE.
A. ...
arXiv:2007.06201v1
fatcat:d3ueaw3xardn5drwe5zb7jwlqi
Public Evidence from Secret Ballots
[chapter]
2017
Lecture Notes in Computer Science
But they have a unique, challenging combination of security and privacy requirements. ...
It is thus not surprising that voting is a rich research area spanning theory, applied cryptography, practical systems analysis, usable security, and statistics. ...
a blockchain and everyone can see and agree upon the outcome of the election. ...
doi:10.1007/978-3-319-68687-5_6
fatcat:jremw3az2rey5jxlb3ujegbthu
Public Evidence from Secret Ballots
[article]
2017
arXiv
pre-print
But they have a unique, challenging combination of security and privacy requirements. ...
It is thus not surprising that voting is a rich research area spanning theory, applied cryptography, practical systems analysis, usable security, and statistics. ...
a blockchain and everyone can see and agree upon the outcome of the election. ...
arXiv:1707.08619v2
fatcat:2b4d26mwlfb6zhqy7vp6fwauja
The token's secret: the two-faced financial incentive of the token economy
2020
Electronic Markets
The resulting findings suggest that blockchain-enabled utility tokens can help to overcome the "chicken and egg" problem. ...
For this purpose, we model the token value development and the associated incentives in a multi-sided blockchain-enabled platform. ...
Second, developers of a blockchain project can earn tokens as a giveaway (Ehrsam 2016b) . ...
doi:10.1007/s12525-020-00412-9
fatcat:apb64p4ehzfong7ba34r76pswy
Secure and secret cooperation in robotic swarms
[article]
2021
arXiv
pre-print
With this method, operators can provide the "blueprint" of the swarm's mission without disclosing its raw data. In other words, data verification can be separated from data itself. ...
We propose a system where robots in a swarm, to cooperate towards mission completion, have to "prove" their integrity to their peers by exchanging cryptographic proofs. ...
) (26) or malicious robots (27, 28) can have a significant impact on Figure 1 : Towards secure and secret cooperation in swarm robotics missions. ...
arXiv:1904.09266v3
fatcat:qntdopflhfew5p6cmpwps2avvu
Fair and Efficient Robust Secret Sharing Scheme against Rushing Adversaries
2022
Security and Communication Networks
In this work, we construct a blockchain-aided RSS scheme that can ensure decentralization and fairness. ...
Robust secret sharing (RSS) is an extension of secret sharing, which can reconstruct a secret correctly even if any t shares are incorrect. The existing scheme would not effectively achieve fairness. ...
Sim outputs whatever A outputs. If A does not upload key i to the smart contract before t submit 2 , the smart contract can keep his deposit. ...
doi:10.1155/2022/7926057
fatcat:zyy3ry7osfc63cg4s5dgv7xake
Transfer of Secret Data using Re-encryption Technique with Hyperledger Fabric based on Blockchain Technology
2021
International Journal for Research in Applied Science and Engineering Technology
Blockchain technology with the personal blockchain becomes a potential, great solution due to its immutability properties. Unfortunately. This work aims to propose a blockchain-based PHR model. ...
The proposed model is built using the Hyper-ledger Fabric concept to support a tamper resistance feature. ...
In order to protect health data, solution proposed involves the use of two types of chains: a private one, which keeps real ID of the patient's information, and a public one, which stores information about ...
doi:10.22214/ijraset.2021.35725
fatcat:uko6dfpz7nadrkynldnzaswg7i
Delegated Proof of Secret Sharing: A Privacy-Preserving Consensus Protocol Based on Secure Multiparty Computation for IoT Environment
2022
Network
A key aspect of privacy in the blockchain is the sensitive content of transactions in the permissionless blockchain. ...
Specifically, DPoSS first uses polynomial interpolation to select a dealer group from many nodes to maintain the consensus of the blockchain system, in which the dealers in the dealer group take turns ...
We propose one method to keep the efficiency of the election when the number of nodes in the blockchain network is very large.
4. ...
doi:10.3390/network2010005
fatcat:x7v6sncmzrfmle7foomxmzqeq4
Meaningful Secret Image Sharing with Saliency Detection
2022
Entropy
To improve the shadow quality, we design a meaningful secret image sharing scheme with saliency detection. Saliency detection is used to determine the salient regions of cover images. ...
Secret image sharing (SIS), as one of the applications of information theory in information security protection, has been widely used in many areas, such as blockchain, identity authentication and distributed ...
In a secret image sharing scheme with a (k, n) threshold [9] , a secret image is divided into n shadows and sent to n participants. ...
doi:10.3390/e24030340
pmid:35327851
pmcid:PMC8947542
fatcat:wwwmebycingopmrl7wlc7bzedq
Three secrets of survival in science advice
2019
Nature
Three secrets of survival in science advice Be impartial, humble and good value, urge Chris Tyler and Karen Akerlof.
© 2 0 1 9 S p r i n g e r N a t u r e L i m i t e d . ...
Recent examples include blockchain technology and animal experimentation. It leaves issues that are more driven by social science to others. ...
US President Donald Trump tours a technology factory in Mount Pleasant, Wisconsin. The future of jobs has been reported on by many nations' science advisory bodies. ...
doi:10.1038/d41586-019-00518-x
fatcat:ttjwupgdqrdbtbp6f7izcbvny4
Secret Sharing Sharing For Highly Scalable Secure Aggregation
[article]
2022
arXiv
pre-print
In the malicious setting with 5% corrupt clients and 5% dropouts, our protocol can aggregate over a federation with 100,000,000 members and vectors of length 100 while requiring each client to communicate ...
It is similar to secret sharing protocols extended to vectors of values-aka gradients-but within groups we add an additional layer of secret sharing of shares themselves-aka sharding. ...
Our approach requires a threshold secret sharing scheme with the following properties: • share(𝑡, 𝑛, 𝑠): breaks secret 𝑠 into 𝑛 secret shares that can reconstruct 𝑠 with any subset of at least 𝑡 ...
arXiv:2201.00864v2
fatcat:mujyxka7dbgonjzmfyffehq32y
« Previous
Showing results 1 — 15 out of 4,156 results