scholarly journals A Semidecentralized PKI System Based on Public Blockchains with Automatic Indemnification Mechanism

2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Gwan-Hwan Hwang ◽  
Tao-Ku Chang ◽  
Hung-Wen Chiang

The PKI framework is a widely used network identity verification framework. Users will register their identity information with a certification authority to obtain a digital certificate and then show the digital certificate to others as an identity certificate. After others receive the certificate, they must check the revocation list from the CA to confirm whether the certificate is valid. Although this architecture has a long history of use on the Internet, significant doubt surrounds its security. Because the CA may be attacked by DDoS, the verifier may not obtain the revocation list to complete the verification process. At present, there are many new PKI architectures that can improve on the CA’s single point of failure, but since they still have some shortcomings, the original architecture is still used. In this paper, we proposed a semidecentralized PKI architecture that can easily prevent a single point of failure. Users can obtain cryptographic evidence through specific protocols to clarify the responsibility for the incorrect certificate and then submit the cryptographic evidence to the smart contract for automatic judgment and indemnification.

2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Sheng Gao ◽  
Qianqian Su ◽  
Rui Zhang ◽  
Jianming Zhu ◽  
Zhiyuan Sui ◽  
...  

Traditional identity authentication solutions mostly rely on a trusted central entity, so they cannot handle single points of failure well. In addition, most of these traditional schemes need to store a large amount of identity authentication or public key information, which makes the schemes difficult to expand and use in distributed situations. In addition, the user prefers to protect the privacy of their information during the identity verification process. Due to the open and decentralized nature of the blockchain, the existing identity verification schemes are difficult to apply well in the blockchain. To solve this problem, in this article, we propose a privacy protection identity authentication scheme based on the blockchain. The user independently generates multiple-identity information, and these identities can be used to apply for an identity certificate. Authorities use the ECDSA signature algorithm and the RSA encryption algorithm to complete the distribution of the identity certificate based on the identity information and complete the registration of identity authentication through the smart contract on the blockchain. On the one hand, it can realize the protection of real identity information; on the other hand, it can avoid the storage overhead caused by the need to store a large number of certificates or key pairs. Due to the use of the blockchain, there is no single point of failure in the authentication process, and it can be applied to distributed scenarios. The security and performance analysis show that the proposed scheme can meet security requirements and is feasible.


2021 ◽  
Vol 5 (6) ◽  
pp. 1161-1170
Author(s):  
Valen Brata Pranaya ◽  
Theophilus Wellem

The validity of the routing advertisements sent by one router to another is essential for Internet connectivity. To perform routing exchanges between Autonomous Systems (AS) on the Internet, a protocol known as the Border Gateway Protocol (BGP) is used. One of the most common attacks on routers running BGP is prefix hijacking. This attack aims to disrupt connections between AS and divert routing to destinations that are not appropriate for crimes, such as fraud and data breach. One of the methods developed to prevent prefix hijacking is the Resource Public Key Infrastructure (RPKI). RPKI is a public key infrastructure (PKI) developed for BGP routing security on the Internet and can be used by routers to validate routing advertisements sent by their BGP peers. RPKI utilizes a digital certificate issued by the Certification Authority (CA) to validate the subnet in a routing advertisement. This study aims to implement BGP and RPKI using the Bird Internet Routing Daemon (BIRD). Simulation and implementation are carried out using the GNS3 simulator and a server that acts as the RPKI validator. Experiments were conducted using 4 AS, 7 routers, 1 server for BIRD, and 1 server for validators, and there were 26 invalid or unknown subnets advertised by 2 routers in the simulated topology. The experiment results show that the router can successfully validated the routing advertisement received from its BGP peer using RPKI. All invalid and unknown subnets are not forwarded to other routers in the AS where they are located such that route hijacking is prevented.  


PLoS ONE ◽  
2021 ◽  
Vol 16 (2) ◽  
pp. e0247688
Author(s):  
Karsten Fatur ◽  
Samo Kreft

Anticholinergic plants of the family Solanaceae have a long history of use as medicines, poisons, and recreational drugs. Though they were the intoxicating substances of choice throughout Europe for centuries, their use for these purposes has declined with the globalisation of other recreational drugs. The present study sought to examine the level of knowledge surrounding these plants among individuals who had used other hallucinogenic plants or mushrooms in Slovenia. Participants were questioned in regards to the anticholinergic Solanaceae that are known to grow wild in Slovenia: Atropa belladonna L., Datura stramonium L., Hyoscyamus niger L., and Scopolia carniolica L. As expected, only a small number of individuals had any substantial knowledge of these plants, and fewer still had used them; some were even unfamiliar with any of these plants. Knowledge of toxicity generally arose from family members, while books and the internet played prominent roles in regards to use knowledge. Knowledge of the plants was vastly varied, with many individuals confusing the plants for others, especially other members of the Solanaceae. Ultimately, a small group of individuals had the largest body of knowledge of these plants, though this was linked with university studies rather than traditional uses. Knowledge of the intoxicating Solanaceae has been largely lost in Slovenia among users of other botanical hallucinogens, likely due to the various dangers their use poses and the undesirable effects they often cause.


Author(s):  
Dan Jerker B. Svantesson

Internet jurisdiction has emerged as one of the greatest and most urgent challenges online, severely affecting areas as diverse as e-commerce, data privacy, law enforcement, content take-downs, cloud computing, e-health, Cyber security, intellectual property, freedom of speech, and Cyberwar. In this innovative book, Professor Svantesson presents a vision for a new approach to Internet jurisdiction––for both private international law and public international law––based on sixteen years of research dedicated specifically to the topic. The book demonstrates that our current paradigm remains attached to a territorial thinking that is out of sync with our modern world, especially, but not only, online. Having made the claim that our adherence to the territoriality principle is based more on habit than on any clear and universally accepted legal principles, Professor Svantesson advances a new jurisprudential framework for how we approach jurisdiction. He also proposes several other reform initiatives such as the concept of ‘investigative jurisdiction’ and an approach to geo-blocking, aimed at equipping us to solve the Internet jurisdiction puzzle. In addition, the book provides a history of Internet jurisdiction, and challenges our traditional categorisation of different types of jurisdiction. It places Internet jurisdiction in a broader context and outlines methods for how properly to understand and work with rules of Internet jurisdiction. While Solving the Internet Puzzle paints a clear picture of the concerns involved and the problems that needs to be overcome, this book is distinctly aimed at finding practical solutions anchored in a solid theoretical framework.


Author(s):  
Tim Whitmarsh

This chapter discusses the history of scholarship trying to trace the origins of the novel, and the impossibility of attempting to pin down a single point of origination.


Polymers ◽  
2021 ◽  
Vol 13 (11) ◽  
pp. 1711
Author(s):  
Heba A. Gad ◽  
Autumn Roberts ◽  
Samirah H. Hamzi ◽  
Haidy A. Gad ◽  
Ilham Touiss ◽  
...  

Jojoba is a widely used medicinal plant that is cultivated worldwide. Its seeds and oil have a long history of use in folklore to treat various ailments, such as skin and scalp disorders, superficial wounds, sore throat, obesity, and cancer; for improvement of liver functions, enhancement of immunity, and promotion of hair growth. Extensive studies on Jojoba oil showed a wide range of pharmacological applications, including antioxidant, anti-acne and antipsoriasis, anti-inflammatory, antifungal, antipyretic, analgesic, antimicrobial, and anti-hyperglycemia activities. In addition, Jojoba oil is widely used in the pharmaceutical industry, especially in cosmetics for topical, transdermal, and parenteral preparations. Jojoba oil also holds value in the industry as an anti-rodent, insecticides, lubricant, surfactant, and a source for the production of bioenergy. Jojoba oil is considered among the top-ranked oils due to its wax, which constitutes about 98% (mainly wax esters, few free fatty acids, alcohols, and hydrocarbons). In addition, sterols and vitamins with few triglyceride esters, flavonoids, phenolic and cyanogenic compounds are also present. The present review represents an updated literature survey about the chemical composition of jojoba oil, its physical properties, pharmacological activities, pharmaceutical and industrial applications, and toxicity.


Cryptography ◽  
2021 ◽  
Vol 5 (2) ◽  
pp. 14
Author(s):  
Xavier Boyen ◽  
Udyani Herath ◽  
Matthew McKague ◽  
Douglas Stebila

The conventional public key infrastructure (PKI) model, which powers most of the Internet, suffers from an excess of trust into certificate authorities (CAs), compounded by a lack of transparency which makes it vulnerable to hard-to-detect targeted stealth impersonation attacks. Existing approaches to make certificate issuance more transparent, including ones based on blockchains, are still somewhat centralized. We present decentralized PKI transparency (DPKIT): a decentralized client-based approach to enforcing transparency in certificate issuance and revocation while eliminating single points of failure. DPKIT efficiently leverages an existing blockchain to realize an append-only, distributed associative array, which allows anyone (or their browser) to audit and update the history of all publicly issued certificates and revocations for any domain. Our technical contributions include definitions for append-only associative ledgers, a security model for certificate transparency, and a formal analysis of our DPKIT construction with respect to the same. Intended as a client-side browser extension, DPKIT will be effective at fraud detection and prosecution, even under fledgling user adoption, and with better coverage and privacy than federated observatories, such as Google’s or the Electronic Frontier Foundation’s.


Molecules ◽  
2021 ◽  
Vol 26 (12) ◽  
pp. 3712
Author(s):  
Ryan D. Rattray ◽  
Ben-Erik Van Wyk

The Lamiaceae is undoubtedly an important plant family, having a rich history of use that spans the globe with many species being used in folk medicine and modern industries alike. Their ability to produce aromatic volatile oils has made them valuable sources of materials in the cosmetic, culinary, and pharmaceutical industries. A thorough account of the taxonomic diversity, chemistry and ethnobotany is lacking for southern African Lamiaceae, which feature some of the region’s most notable medicinal and edible plant species. We provide a comprehensive insight into the Lamiaceae flora of southern Africa, comprising 297 species in 42 genera, 105 of which are endemic to the subcontinent. We further explore the medicinal and traditional uses, where all genera with documented uses are covered for the region. A broad review of the chemistry of southern African Lamiaceae is presented, noting that only 101 species (34%) have been investigated chemically (either their volatile oils or phytochemical characterization of secondary metabolites), thus presenting many and varied opportunities for further studies. The main aim of our study was therefore to present an up-to-date account of the botany, chemistry and traditional uses of the family in southern Africa, and to identify obvious knowledge gaps.


Molecules ◽  
2020 ◽  
Vol 26 (1) ◽  
pp. 175
Author(s):  
David M. Stevens ◽  
Rachael M. Crist ◽  
Stephan T. Stern

The chloroquine family of antimalarials has a long history of use, spanning many decades. Despite this extensive clinical experience, novel applications, including use in autoimmune disorders, infectious disease, and cancer, have only recently been identified. While short term use of chloroquine or hydroxychloroquine is safe at traditional therapeutic doses in patients without predisposing conditions, administration of higher doses and for longer durations are associated with toxicity, including retinotoxicity. Additional liabilities of these medications include pharmacokinetic profiles that require extended dosing to achieve therapeutic tissue concentrations. To improve chloroquine therapy, researchers have turned toward nanomedicine reformulation of chloroquine and hydroxychloroquine to increase exposure of target tissues relative to off-target tissues, thereby improving the therapeutic index. This review highlights these reformulation efforts to date, identifying issues in experimental designs leading to ambiguity regarding the nanoformulation improvements and lack of thorough pharmacokinetics and safety evaluation. Gaps in our current understanding of these formulations, as well as recommendations for future formulation efforts, are presented.


2003 ◽  
Vol 28 (1) ◽  
pp. 10-14 ◽  
Author(s):  
Christian David ◽  
Catherine Granger ◽  
Nicole Picot

The French national museum libraries service comprises 21 libraries specialising in the history of western art and archaeology. The central library, which is at the head of the network, was automated first and has completed its retrospective conversion. At first this library catalogued the material acquired for all the others; then a number of them were able in their turn to computerise and thus contribute directly to the union catalogue of the national museum libraries. This can now be consulted on the internet site of the Ministry of Culture.


Sign in / Sign up

Export Citation Format

Share Document