scholarly journals Protecting the Creation of Digital Signatures with Trusted Computing Platform Technology Against Attacks by Trojan Horse Programs

Author(s):  
Adrian Spalka ◽  
Armin B. Cremers ◽  
Hanno Langweg
2018 ◽  
Vol 2 (2) ◽  
pp. 106-120 ◽  
Author(s):  
Mahalingam Ramkumar

Purpose The purpose of this paper is to examine the blockchain as a trusted computing platform. Understanding the strengths and limitations of this platform is essential to execute large-scale real-world applications in blockchains. Design/methodology/approach This paper proposes several modifications to conventional blockchain networks to improve the scale and scope of applications. Findings Simple modifications to cryptographic protocols for constructing blockchain ledgers, and digital signatures for authentication of transactions, are sufficient to realize a scalable blockchain platform. Originality/value The original contributions of this paper are concrete steps to overcome limitations of current blockchain networks.


Author(s):  
Boris Balacheff ◽  
David Chan ◽  
Liqun Chen ◽  
Siani Pearson ◽  
Graeme Proudler

2010 ◽  
Vol 33 (7) ◽  
pp. 1165-1176 ◽  
Author(s):  
Ming-Di XU ◽  
Huan-Guo ZHANG ◽  
Heng ZHAO ◽  
Jun-Lin LI ◽  
Fei YAN

2007 ◽  
Vol 12 (1) ◽  
pp. 101-104 ◽  
Author(s):  
Liming Hao ◽  
Xun Sun ◽  
Shutang Yang ◽  
Songnian Lu

2012 ◽  
Vol 482-484 ◽  
pp. 279-286
Author(s):  
Zhi Gang Si ◽  
Ping Li ◽  
Xin Chen ◽  
Ying Wan

A trusted computing platform is designed based on XEN virtual machine, and a dynamic integrity measurement scheme is presented using hypercall mechanism. This scheme can solve the deficiency of limited scope or complicated structure comparing with other dynamic integrity measurement schemes.


Sign in / Sign up

Export Citation Format

Share Document