Filters








4,156 Hits in 1.9 sec

Public Accountability vs. Secret Laws: Can They Coexist?

Shafi Goldwasser, Sunoo Park
2017 Proceedings of the 2017 on Workshop on Privacy in the Electronic Society - WPES '17  
Our scheme can be directly instantiated on the Ethereum blockchain (and a simplified version with weaker guarantees can be instantiated with Bitcoin).  ...  Post 9/11, journalists, scholars and activists have pointed out that secret laws -a body of law whose details and sometime mere existence is classified as top secret -were on the rise in all three branches  ...  However, it is also very important in the context of businesses which hold secret information about business practices (this is desirable since the ability to keep trade secrets can benefit the economy  ... 
doi:10.1145/3139550.3139565 dblp:conf/wpes/GoldwasserP17 fatcat:4o3pw7do4rclljtbfxxorlimda

SHARVOT: secret SHARe-based VOTing on the blockchain [article]

Silvia Bartolucci, Pauline Bernat, Daniel Joseph
2018 arXiv   pre-print
In particular, we introduce a secret share-based voting system on the blockchain, the so-called SHARVOT protocol.  ...  In this paper, we discuss possible uses of the blockchain technology to implement a secure and fair voting system.  ...  The dealer also publishes the public keys P A and P B while keeping k A and k B private.  ... 
arXiv:1803.04861v1 fatcat:ffkoj6shyzcx3kwh3svuvp2a64

Scalable Byzantine Consensus via Hardware-assisted Secret Sharing

2018 IEEE transactions on computers  
However, existing BFT protocols can only scale to tens of nodes due to their O(n^2) message complexity. In this paper, we propose FastBFT, a fast and scalable BFT protocol.  ...  At the heart of FastBFT is a novel message aggregation technique that combines hardware-based trusted execution environments (TEEs) with lightweight secret sharing primitives.  ...  ACKNOWLEDGMENTS The work was supported in part by a grant from NEC Labs Europe as well as funding from the Academy of Finland (BCon project, grant #309195).  ... 
doi:10.1109/tc.2018.2860009 fatcat:ck3bjy6j4rhntf7m4ecwycw7ua

Recoverable Private Key Scheme for Consortium Blockchain Based on Verifiable Secret Sharing

2021 KSII Transactions on Internet and Information Systems  
We propose a recoverable private key scheme for consortium blockchain based on the verifiable secret sharing which can enable the user's private key in the consortium blockchain to be securely recovered  ...  through a verifiable secret sharing method.  ...  As a distributed shared ledger and database, the blockchain can enable peers to establish a trusted distributed system without mutual trust.  ... 
doi:10.3837/tiis.2021.08.009 fatcat:bac7mz4rdfdmle73wtbiyu7vqm

The Blockchain Based Auditor on Secret key Life Cycle in Reconfigurable Platform [article]

Rourab Paul, Nimisha Ghosh, Amlan Chakrabarti, Prasant Mahapatra
2020 arXiv   pre-print
In this article, we have proposed and implemented an isolated secret key memory which can log life cycle of secret keys cryptographically using blockchain (BC) technology.  ...  The growing sophistication of cyber attacks, vulnerabilities in high computing systems and increasing dependency on cryptography to protect our digital data make it more important to keep secret keys safe  ...  It is to be noted that blockchain data is written in main memory which can be accessed by the PE. A.  ... 
arXiv:2007.06201v1 fatcat:d3ueaw3xardn5drwe5zb7jwlqi

Public Evidence from Secret Ballots [chapter]

Matthew Bernhard, Josh Benaloh, J. Alex Halderman, Ronald L. Rivest, Peter Y. A. Ryan, Philip B. Stark, Vanessa Teague, Poorvi L. Vora, Dan S. Wallach
2017 Lecture Notes in Computer Science  
But they have a unique, challenging combination of security and privacy requirements.  ...  It is thus not surprising that voting is a rich research area spanning theory, applied cryptography, practical systems analysis, usable security, and statistics.  ...  a blockchain and everyone can see and agree upon the outcome of the election.  ... 
doi:10.1007/978-3-319-68687-5_6 fatcat:jremw3az2rey5jxlb3ujegbthu

Public Evidence from Secret Ballots [article]

Matthew Bernhard, Josh Benaloh, J. Alex Halderman, Ronald L. Rivest, Peter Y. A. Ryan, Philip B. Stark, Vanessa Teague, Poorvi L. Vora, Dan S. Wallach
2017 arXiv   pre-print
But they have a unique, challenging combination of security and privacy requirements.  ...  It is thus not surprising that voting is a rich research area spanning theory, applied cryptography, practical systems analysis, usable security, and statistics.  ...  a blockchain and everyone can see and agree upon the outcome of the election.  ... 
arXiv:1707.08619v2 fatcat:2b4d26mwlfb6zhqy7vp6fwauja

The token's secret: the two-faced financial incentive of the token economy

Benedict J. Drasch, Gilbert Fridgen, Tobias Manner-Romberg, Fenja M. Nolting, Sven Radszuwill
2020 Electronic Markets  
The resulting findings suggest that blockchain-enabled utility tokens can help to overcome the "chicken and egg" problem.  ...  For this purpose, we model the token value development and the associated incentives in a multi-sided blockchain-enabled platform.  ...  Second, developers of a blockchain project can earn tokens as a giveaway (Ehrsam 2016b) .  ... 
doi:10.1007/s12525-020-00412-9 fatcat:apb64p4ehzfong7ba34r76pswy

Secure and secret cooperation in robotic swarms [article]

Eduardo Castelló Ferrer and Thomas Hardjono and Alex 'Sandy' Pentland and Marco Dorigo
2021 arXiv   pre-print
With this method, operators can provide the "blueprint" of the swarm's mission without disclosing its raw data. In other words, data verification can be separated from data itself.  ...  We propose a system where robots in a swarm, to cooperate towards mission completion, have to "prove" their integrity to their peers by exchanging cryptographic proofs.  ...  ) (26) or malicious robots (27, 28) can have a significant impact on Figure 1 : Towards secure and secret cooperation in swarm robotics missions.  ... 
arXiv:1904.09266v3 fatcat:qntdopflhfew5p6cmpwps2avvu

Fair and Efficient Robust Secret Sharing Scheme against Rushing Adversaries

En Zhang, Renlin Yang, Haiju Fan, Leiyong Qin, Wei Feng
2022 Security and Communication Networks  
In this work, we construct a blockchain-aided RSS scheme that can ensure decentralization and fairness.  ...  Robust secret sharing (RSS) is an extension of secret sharing, which can reconstruct a secret correctly even if any t shares are incorrect. The existing scheme would not effectively achieve fairness.  ...  Sim outputs whatever A outputs. If A does not upload key i to the smart contract before t submit 2 , the smart contract can keep his deposit.  ... 
doi:10.1155/2022/7926057 fatcat:zyy3ry7osfc63cg4s5dgv7xake

Transfer of Secret Data using Re-encryption Technique with Hyperledger Fabric based on Blockchain Technology

Bhagyashri H. Adhau
2021 International Journal for Research in Applied Science and Engineering Technology  
Blockchain technology with the personal blockchain becomes a potential, great solution due to its immutability properties. Unfortunately. This work aims to propose a blockchain-based PHR model.  ...  The proposed model is built using the Hyper-ledger Fabric concept to support a tamper resistance feature.  ...  In order to protect health data, solution proposed involves the use of two types of chains: a private one, which keeps real ID of the patient's information, and a public one, which stores information about  ... 
doi:10.22214/ijraset.2021.35725 fatcat:uko6dfpz7nadrkynldnzaswg7i

Delegated Proof of Secret Sharing: A Privacy-Preserving Consensus Protocol Based on Secure Multiparty Computation for IoT Environment

Tieming Geng, Laurent Njilla, Chin-Tser Huang
2022 Network  
A key aspect of privacy in the blockchain is the sensitive content of transactions in the permissionless blockchain.  ...  Specifically, DPoSS first uses polynomial interpolation to select a dealer group from many nodes to maintain the consensus of the blockchain system, in which the dealers in the dealer group take turns  ...  We propose one method to keep the efficiency of the election when the number of nodes in the blockchain network is very large. 4.  ... 
doi:10.3390/network2010005 fatcat:x7v6sncmzrfmle7foomxmzqeq4

Meaningful Secret Image Sharing with Saliency Detection

Jingwen Cheng, Xuehu Yan, Lintao Liu, Yue Jiang, Xuan Wang
2022 Entropy  
To improve the shadow quality, we design a meaningful secret image sharing scheme with saliency detection. Saliency detection is used to determine the salient regions of cover images.  ...  Secret image sharing (SIS), as one of the applications of information theory in information security protection, has been widely used in many areas, such as blockchain, identity authentication and distributed  ...  In a secret image sharing scheme with a (k, n) threshold [9] , a secret image is divided into n shadows and sent to n participants.  ... 
doi:10.3390/e24030340 pmid:35327851 pmcid:PMC8947542 fatcat:wwwmebycingopmrl7wlc7bzedq

Three secrets of survival in science advice

Chris Tyler, Karen Akerlof
2019 Nature  
Three secrets of survival in science advice Be impartial, humble and good value, urge Chris Tyler and Karen Akerlof. © 2 0 1 9 S p r i n g e r N a t u r e L i m i t e d .  ...  Recent examples include blockchain technology and animal experimentation. It leaves issues that are more driven by social science to others.  ...  US President Donald Trump tours a technology factory in Mount Pleasant, Wisconsin. The future of jobs has been reported on by many nations' science advisory bodies.  ... 
doi:10.1038/d41586-019-00518-x fatcat:ttjwupgdqrdbtbp6f7izcbvny4

Secret Sharing Sharing For Highly Scalable Secure Aggregation [article]

Timothy Stevens, Joseph Near, Christian Skalka
2022 arXiv   pre-print
In the malicious setting with 5% corrupt clients and 5% dropouts, our protocol can aggregate over a federation with 100,000,000 members and vectors of length 100 while requiring each client to communicate  ...  It is similar to secret sharing protocols extended to vectors of values-aka gradients-but within groups we add an additional layer of secret sharing of shares themselves-aka sharding.  ...  Our approach requires a threshold secret sharing scheme with the following properties: • share(𝑡, 𝑛, 𝑠): breaks secret 𝑠 into 𝑛 secret shares that can reconstruct 𝑠 with any subset of at least 𝑡  ... 
arXiv:2201.00864v2 fatcat:mujyxka7dbgonjzmfyffehq32y
« Previous Showing results 1 — 15 out of 4,156 results