A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
PoW-Based Distributed Cryptography with No Trusted Setup
[chapter]
2015
Lecture Notes in Computer Science
computing power and there is no trusted setup (like PKI, or an unpredictable beacon). ...
Under a stronger assumption that the majority of computing power is controlled by the honest parties we construct a protocol for simulating any trusted functionality with guaranteed termination (i.e. that ...
We also believe that the "PoW-based distributed cryptography" can find several other applications in the peer-to-peer networks (we describe some of them). ...
doi:10.1007/978-3-662-48000-7_19
fatcat:xbj4ndbucbbdxd2i4752rmdxou
PoAh: A Novel Consensus Algorithm for Fast Scalable Private Blockchain for Large-scale IoT Frameworks
[article]
2020
arXiv
pre-print
Due to the resource limitations of the devices, PoW is not suitable for blockchain-based security solutions. ...
Finally, PoAh and its integration with the blockchain in the IoT and edge computing scenarios is discussed. ...
Paper)
2019 Permission
Based
Authentication No Known
Attacks ...
arXiv:2001.07297v1
fatcat:apyezcs2k5ekvoaxykuix3erje
Quantum solutions to possible challenges of Blockchain technology
[article]
2021
arXiv
pre-print
This can put threats on both public-key cryptosystems and hash functions, which necessarily demands to migrate from classical cryptography to quantum-secure cryptography. ...
Post Quantum Cryptographic algorithms like Code-based, Lattice-based, Multivariate-based, and other schemes are not well suited for classical blockchain technology due to several disadvantages in practical ...
Some of the most promising PQC areas include hash-based cryptography, code-based cryptography, lattice-based cryptography, and multivariate-quadratic-equations cryptography. ...
arXiv:2110.05321v1
fatcat:kgrjb4bahbey7kexdx6barpfca
A Taxonomy of Blockchain Consensus Methods
2020
Cryptography
Since 2009, with the arrival of Bitcoin [1] , blockchain technology has fit this cycle, borrowing from mature technologies, such as database systems, distributed computing, decentralised systems, cryptography ...
A trusted setup requires nodes to validate each other through a key-exchange procedure or similar. ...
Funding: This research received no external funding.
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/cryptography4040032
fatcat:5odh2nuv7veypo7cahu4tv5tui
Pay as You Go: A Generic Crypto Tolling Architecture
[article]
2020
arXiv
pre-print
The appearance of new cryptography based solutions envisaging digital identity and currency exchange are set to stem new approaches for existing and future challenges. ...
The imminent pervasive adoption of vehicular communication, based on dedicated short-range technology (ETSI ITS G5 or IEEE WAVE), 5G, or both, will foster a richer service ecosystem for vehicular applications ...
The emergence of new cryptography based technologies for digital identity and currency will stem new solutions that will meet existing and future challenges. ...
arXiv:2005.02875v1
fatcat:6mfp57m35nbcno5umvriz3j2vu
Analysis of Distributed Ledger Technologies for Industrial Manufacturing
[article]
2022
arXiv
pre-print
To enable such pay-per-use business models, Distributed Ledger Technology (DLT) is a viable option to establish decentralized trust and traceability. ...
Thus, in this paper, we study potential DLT technologies for an efficient and intelligent integration of DLT-based solutions in manufacturing environments. ...
ACKNOWLEDGEMENTS This work has received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No. 957218 (Project IntellIoT). ...
arXiv:2205.07617v1
fatcat:7lnieznceraxxcwzwnno4skgiu
Blockchain Based Trust Model Using Tendermint in Vehicular Adhoc Networks
2021
Applied Sciences
We proposed a blockchain-based trust management model for the vehicular adhoc network (VANET) based on Tendermint. ...
Based on the validation results, the message source vehicle generates the ratings that are to be uploaded to roadside units (RSUs), and through that, the trust offset value can be calculated. ...
Data Availability Statement: No new data were created or analyzed in this study. Data sharing is not applicable to this article.
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/app11051998
fatcat:b3fmx6oslfbdfbr42tslzydhnu
Practical Time-Release Blockchain
2020
Electronics
Time-release cryptography is a special encryption technique that allows a message to be hidden for some time. ...
Third, our scheme does not need any trusted agents (third parties). Fourth, the proposed method uses standard cryptographic algorithms. ...
All PoW-based blockchains are autonomously adjusted such that a new block is mined at regular intervals. ...
doi:10.3390/electronics9040672
fatcat:spdwxobmffbr7gl7ratesfl7ui
Designing a Blockchain-Based IoT With Ethereum, Swarm, and LoRa: The Software Solution to Create High Availability With Minimal Security Risks
2019
IEEE Consumer Electronics Magazine
Such a data backend will ensure high availability with minimal security risks while replacing traditional backend systems with a single "smart contract". ...
The illustrated system used LoRa as the emerging network technology, Swarm as the distributed data storage and Ethereum as the blockchain platform. ...
Custom Protocol Sensor with Custom Protocol Transparent Proxy Centralized Core Services
Blockchain IoT Server-trusting Client or
Sensor with Custom Protocol
Thin Client or
Server-trusting Client ...
doi:10.1109/mce.2018.2880806
fatcat:kcc7gwdez5bvlphme6mfah7wbu
Trust Mends Blockchains: Living up to Expectations
2019
2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS)
PoW relies on demonstration of computational power, and comes with the markup of huge energy wastage in return of the stake in cyrpto-currency. ...
In our PoT construction, peer trust is extracted from a trust network that emerges in a decentralized manner and is used as a waiver for the effort to be spent for PoW, thus dramatically reducing total ...
We do no consider these values in weithing edges as we assign our own based on different experimental setups as is shown below. ...
doi:10.1109/icdcs.2019.00136
dblp:conf/icdcs/BahriG19
fatcat:cihqjpgldvf3lkqjmcintx46i4
A Survey on Blockchain for Enabling Transparency in transactions of Government Direct Benefit Transfers (DBT)
2019
International Journal of Computer Applications
Blockchain has a great potential in distributed shared peer to peer ledger like spreadsheets that record any transaction. A copy of ledger is shared between all stakeholders. ...
Traditionally, within the society, people have created trust through intermediaries. ...
The strength of blockchain transparency lies in trust; thus, no transaction can be changed or manipulated after it has been recorded -with a centralized system, outsiders cannot assess the trustworthiness ...
doi:10.5120/ijca2019918637
fatcat:66aidjoe7fggzmt6aarrhtnpru
Blockchains for Government: Use Cases and Challenges
2020
Digital Government: Research and Practice (DGOV)
We begin with reviewing the categories of blockchains, the underlying mechanisms, and why blockchains can achieve their security goals. ...
Blockchain is the technology used by developers of cryptocurrencies, like Bitcoin, to enable exchange of financial "coins" between participants in the absence of a trusted third party to ensure the transaction ...
For instance, Proof-of-Elapsed-Time replaces PoW with trusted hardware, using Intel Software Guard Extension (SGX), a trusted execution environment. ...
doi:10.1145/3427097
fatcat:u4xtnsht3jaxtn2aai7rir3qry
Lightweight Blockchain to Improve Security and Privacy in Smarthome
2020
International journal of recent technology and engineering
Internet of Things (IoT) growing at a rate of exponential numbers in recent years has received extensive attention with BlockChain (BC) technology which provide trust to IoT with its immutable nature, ...
This work provides lightweight BlockChain with two prominent consensus mechanism PoW – Proof of Work and PoS – Proof of Stake for smart IoT devices. ...
BUILDING TRUST WITH BLOCKCHAIN Building a trust using Blockchain enhances trust among business networks [16] . ...
doi:10.35940/ijrte.f9006.038620
fatcat:yi22tzeiinap5bsl7iswxv7ami
Enhancing Security in VANETs with Efficient Sybil Attack Detection using Fog Computing
[article]
2021
arXiv
pre-print
Previous researchers used either cryptography, trust scores, or past vehicle data to detect rogue nodes, but they suffer from high processing delay, overhead, and false-positive rate (FPR). ...
The performance of our framework was carried out with simulations using OMNET++ and SUMO simulators. ...
FPR = No. of honest nodes detected incorrectly Total no. of honest nodes
Fig. 3 . 3 Comparison of the FSDV framework with PoW, IDS, and TM schemes: (a) data processing time, (b) PLR, (c) average throughput ...
arXiv:2108.10319v1
fatcat:cytddaixirfvfku73mxb5wzfxe
Pay as You Go: A Generic Crypto Tolling Architecture
2020
IEEE Access
The appearance of new cryptography-based solutions envisaging digital identity and currency exchange are set to stem new approaches for existing and future challenges. ...
The emergence of new cryptography based technologies for digital identity and currency will stem new solutions that will meet existing and future challenges. ...
Thus, the results from the proof of concept testbed on timeliness and latency shall hold, even for an experimental setup based on C-V2X mode 4 communications. ...
doi:10.1109/access.2020.3034299
fatcat:wi5ztj4ckjgxdknnz2h2mtnzce
« Previous
Showing results 1 — 15 out of 584 results