584 Hits in 4.8 sec

PoW-Based Distributed Cryptography with No Trusted Setup [chapter]

Marcin Andrychowicz, Stefan Dziembowski
2015 Lecture Notes in Computer Science  
computing power and there is no trusted setup (like PKI, or an unpredictable beacon).  ...  Under a stronger assumption that the majority of computing power is controlled by the honest parties we construct a protocol for simulating any trusted functionality with guaranteed termination (i.e. that  ...  We also believe that the "PoW-based distributed cryptography" can find several other applications in the peer-to-peer networks (we describe some of them).  ... 
doi:10.1007/978-3-662-48000-7_19 fatcat:xbj4ndbucbbdxd2i4752rmdxou

PoAh: A Novel Consensus Algorithm for Fast Scalable Private Blockchain for Large-scale IoT Frameworks [article]

Deepak Puthal and Saraju P. Mohanty and Venkata P. Yanambaka and Elias Kougianos
2020 arXiv   pre-print
Due to the resource limitations of the devices, PoW is not suitable for blockchain-based security solutions.  ...  Finally, PoAh and its integration with the blockchain in the IoT and edge computing scenarios is discussed.  ...  Paper) 2019 Permission Based Authentication No Known Attacks  ... 
arXiv:2001.07297v1 fatcat:apyezcs2k5ekvoaxykuix3erje

Quantum solutions to possible challenges of Blockchain technology [article]

Nivedita Dey, Mrityunjay Ghosh, Amlan Chakrabarti
2021 arXiv   pre-print
This can put threats on both public-key cryptosystems and hash functions, which necessarily demands to migrate from classical cryptography to quantum-secure cryptography.  ...  Post Quantum Cryptographic algorithms like Code-based, Lattice-based, Multivariate-based, and other schemes are not well suited for classical blockchain technology due to several disadvantages in practical  ...  Some of the most promising PQC areas include hash-based cryptography, code-based cryptography, lattice-based cryptography, and multivariate-quadratic-equations cryptography.  ... 
arXiv:2110.05321v1 fatcat:kgrjb4bahbey7kexdx6barpfca

A Taxonomy of Blockchain Consensus Methods

Jeff Nijsse, Alan Litchfield
2020 Cryptography  
Since 2009, with the arrival of Bitcoin [1] , blockchain technology has fit this cycle, borrowing from mature technologies, such as database systems, distributed computing, decentralised systems, cryptography  ...  A trusted setup requires nodes to validate each other through a key-exchange procedure or similar.  ...  Funding: This research received no external funding. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/cryptography4040032 fatcat:5odh2nuv7veypo7cahu4tv5tui

Pay as You Go: A Generic Crypto Tolling Architecture [article]

Paulo Bartolomeu and Emanuel Vieira and Joaquim Ferreira
2020 arXiv   pre-print
The appearance of new cryptography based solutions envisaging digital identity and currency exchange are set to stem new approaches for existing and future challenges.  ...  The imminent pervasive adoption of vehicular communication, based on dedicated short-range technology (ETSI ITS G5 or IEEE WAVE), 5G, or both, will foster a richer service ecosystem for vehicular applications  ...  The emergence of new cryptography based technologies for digital identity and currency will stem new solutions that will meet existing and future challenges.  ... 
arXiv:2005.02875v1 fatcat:6mfp57m35nbcno5umvriz3j2vu

Analysis of Distributed Ledger Technologies for Industrial Manufacturing [article]

Lam Duc Nguyen, Arne Broering, Massimo Pizzol, Petar Popovski
2022 arXiv   pre-print
To enable such pay-per-use business models, Distributed Ledger Technology (DLT) is a viable option to establish decentralized trust and traceability.  ...  Thus, in this paper, we study potential DLT technologies for an efficient and intelligent integration of DLT-based solutions in manufacturing environments.  ...  ACKNOWLEDGEMENTS This work has received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No. 957218 (Project IntellIoT).  ... 
arXiv:2205.07617v1 fatcat:7lnieznceraxxcwzwnno4skgiu

Blockchain Based Trust Model Using Tendermint in Vehicular Adhoc Networks

Sandeep Arora, Gulshan Kumar, Tai-hoon Kim
2021 Applied Sciences  
We proposed a blockchain-based trust management model for the vehicular adhoc network (VANET) based on Tendermint.  ...  Based on the validation results, the message source vehicle generates the ratings that are to be uploaded to roadside units (RSUs), and through that, the trust offset value can be calculated.  ...  Data Availability Statement: No new data were created or analyzed in this study. Data sharing is not applicable to this article. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/app11051998 fatcat:b3fmx6oslfbdfbr42tslzydhnu

Practical Time-Release Blockchain

Sang-Wuk Chae, Jae-Ik Kim, Yongsu Park
2020 Electronics  
Time-release cryptography is a special encryption technique that allows a message to be hidden for some time.  ...  Third, our scheme does not need any trusted agents (third parties). Fourth, the proposed method uses standard cryptographic algorithms.  ...  All PoW-based blockchains are autonomously adjusted such that a new block is mined at regular intervals.  ... 
doi:10.3390/electronics9040672 fatcat:spdwxobmffbr7gl7ratesfl7ui

Designing a Blockchain-Based IoT With Ethereum, Swarm, and LoRa: The Software Solution to Create High Availability With Minimal Security Risks

Kazim Rifat Ozyilmaz, Arda Yurdakul
2019 IEEE Consumer Electronics Magazine  
Such a data backend will ensure high availability with minimal security risks while replacing traditional backend systems with a single "smart contract".  ...  The illustrated system used LoRa as the emerging network technology, Swarm as the distributed data storage and Ethereum as the blockchain platform.  ...  Custom Protocol Sensor with Custom Protocol Transparent Proxy Centralized Core Services Blockchain IoT Server-trusting Client or Sensor with Custom Protocol Thin Client or Server-trusting Client  ... 
doi:10.1109/mce.2018.2880806 fatcat:kcc7gwdez5bvlphme6mfah7wbu

Trust Mends Blockchains: Living up to Expectations

Leila Bahri, Sarunas Girdzijauskas
2019 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS)  
PoW relies on demonstration of computational power, and comes with the markup of huge energy wastage in return of the stake in cyrpto-currency.  ...  In our PoT construction, peer trust is extracted from a trust network that emerges in a decentralized manner and is used as a waiver for the effort to be spent for PoW, thus dramatically reducing total  ...  We do no consider these values in weithing edges as we assign our own based on different experimental setups as is shown below.  ... 
doi:10.1109/icdcs.2019.00136 dblp:conf/icdcs/BahriG19 fatcat:cihqjpgldvf3lkqjmcintx46i4

A Survey on Blockchain for Enabling Transparency in transactions of Government Direct Benefit Transfers (DBT)

Mansi Borole, Abhishek Nilange, Karan Velhal, Tanmay Joshi
2019 International Journal of Computer Applications  
Blockchain has a great potential in distributed shared peer to peer ledger like spreadsheets that record any transaction. A copy of ledger is shared between all stakeholders.  ...  Traditionally, within the society, people have created trust through intermediaries.  ...  The strength of blockchain transparency lies in trust; thus, no transaction can be changed or manipulated after it has been recorded -with a centralized system, outsiders cannot assess the trustworthiness  ... 
doi:10.5120/ijca2019918637 fatcat:66aidjoe7fggzmt6aarrhtnpru

Blockchains for Government: Use Cases and Challenges

James Clavin, Sisi Duan
2020 Digital Government: Research and Practice (DGOV)  
We begin with reviewing the categories of blockchains, the underlying mechanisms, and why blockchains can achieve their security goals.  ...  Blockchain is the technology used by developers of cryptocurrencies, like Bitcoin, to enable exchange of financial "coins" between participants in the absence of a trusted third party to ensure the transaction  ...  For instance, Proof-of-Elapsed-Time replaces PoW with trusted hardware, using Intel Software Guard Extension (SGX), a trusted execution environment.  ... 
doi:10.1145/3427097 fatcat:u4xtnsht3jaxtn2aai7rir3qry

Lightweight Blockchain to Improve Security and Privacy in Smarthome

2020 International journal of recent technology and engineering  
Internet of Things (IoT) growing at a rate of exponential numbers in recent years has received extensive attention with BlockChain (BC) technology which provide trust to IoT with its immutable nature,  ...  This work provides lightweight BlockChain with two prominent consensus mechanism PoW – Proof of Work and PoS – Proof of Stake for smart IoT devices.  ...  BUILDING TRUST WITH BLOCKCHAIN Building a trust using Blockchain enhances trust among business networks [16] .  ... 
doi:10.35940/ijrte.f9006.038620 fatcat:yi22tzeiinap5bsl7iswxv7ami

Enhancing Security in VANETs with Efficient Sybil Attack Detection using Fog Computing [article]

Anirudh Paranjothi, Mohammed Atiquzzaman
2021 arXiv   pre-print
Previous researchers used either cryptography, trust scores, or past vehicle data to detect rogue nodes, but they suffer from high processing delay, overhead, and false-positive rate (FPR).  ...  The performance of our framework was carried out with simulations using OMNET++ and SUMO simulators.  ...  FPR = No. of honest nodes detected incorrectly Total no. of honest nodes Fig. 3 . 3 Comparison of the FSDV framework with PoW, IDS, and TM schemes: (a) data processing time, (b) PLR, (c) average throughput  ... 
arXiv:2108.10319v1 fatcat:cytddaixirfvfku73mxb5wzfxe

Pay as You Go: A Generic Crypto Tolling Architecture

Paulo C. Bartolomeu, Emanuel Vieira, Joaquim Ferreira
2020 IEEE Access  
The appearance of new cryptography-based solutions envisaging digital identity and currency exchange are set to stem new approaches for existing and future challenges.  ...  The emergence of new cryptography based technologies for digital identity and currency will stem new solutions that will meet existing and future challenges.  ...  Thus, the results from the proof of concept testbed on timeliness and latency shall hold, even for an experimental setup based on C-V2X mode 4 communications.  ... 
doi:10.1109/access.2020.3034299 fatcat:wi5ztj4ckjgxdknnz2h2mtnzce
« Previous Showing results 1 — 15 out of 584 results