scholarly journals ETHERST: Ethereum-Based Public Key Infrastructure Identity Management with a Reward-and-Punishment Mechanism

Symmetry ◽  
2021 ◽  
Vol 13 (9) ◽  
pp. 1640
Author(s):  
Chong-Gee Koa ◽  
Swee-Huay Heng ◽  
Ji-Jian Chin

Public Key Infrastructure (PKI) is the fundamental of secure digital communications. It provides a secure means to authenticate identities over the Internet. Symmetric or asymmetric encryption schemes are widely used in identity authentication in any kind of PKI. The conventional PKI has several drawbacks due to the centralized and non-transparent design. Several recent research works utilize blockchain technology to overcome the limitations of conventional implementations of PKI. Blockchain-based PKI integrates blockchain technology with PKI to form a new type of decentralized PKI (DPKI). Several works utilize the currency property in blockchains to implement the reward-and-punishment mechanism. In this paper, we propose a smart contract-based PKI which utilizes the Ethereum smart contract to build a new type of blockchain-based PKI with the reward-and-punishment mechanism using ERC-20 tokens. It has several advantages over previous implementations of similar research that use Ethereum’s main currency—Ether.

2021 ◽  
Vol 235 ◽  
pp. 03020
Author(s):  
Qian Liao ◽  
Mimi Shao

Features like the distributed ledger, consensus mechanism, asymmetric encryption technology, smart contract and Token of blockchain can lower transaction cost, enhance trust between customers and merchants, as well as eliminate false payment and consumer information leakage, problems which are common in current payment of cross-border E-Commerce platform. Based on the analysis of existing scholars, this paper studied two payment models: digital cash payment based on blockchain technology and the application of blockchain in third-party payment platform. Then the paper discussed the mechanism of blockchain in cross-border e-commerce payment platform, and creatively proposed a blockchain cross-border e-commerce payment platform, serving as reference and guidance for further development of blockchain technology in cross-border payment.1


Author(s):  
Brian Tuan Khieu ◽  
Melody Moh

A cloud-based public key infrastructure (PKI) utilizing blockchain technology is proposed. Big data ecosystems have scalable and resilient needs that current PKI cannot satisfy. Enhancements include using blockchains to establish persistent access to certificate data and certificate revocation lists, decoupling of data from certificate authority, and hosting it on a cloud provider to tap into its traffic security measures. Instead of holding data within the transaction data fields, certificate data and status were embedded into smart contracts. The tests revealed a significant performance increase over that of both traditional and the version that stored data within blocks. The proposed method reduced the mining data size, and lowered the mining time to 6.6% of the time used for the block data storage method. Also, the mining gas cost per certificate was consequently cut by 87%. In summary, completely decoupling the certificate authority portion of a PKI and storing certificate data inside smart contracts yields a sizable performance boost while decreasing the attack surface.


Author(s):  
Claudio Agostino Ardagna ◽  
Marco Cremonini ◽  
Ernesto Damiani ◽  
Sabrina De Capitani di Vimercati ◽  
Fulvio Frati ◽  
...  

This chapter introduces the concept of privacy-enhanced identity management for e-services supporting the users needs to protect their privacy and sensitive information. Business activities are increasingly based on the use of remote resources and e-services as well as on the interaction between different, remotely-located, parties. In this context, the electronic execution of private and/or sensitive transactions must fully preserve information privacy by managing in a trustworthy and responsible way all identity and profile information that is released to remote parties. In this chapter, we investigate the main problems concerning identity management for e-services and outline the features that the next-generation of identity management systems should provide for. State-of-the-art technology in the field of privacy-enhanced identity management systems is also compared with traditional Public Key Infrastructure (PKI) solutions. The analysis of the benefits of these modern identity management systems is presented and discussed with references also to the results of some experiences in the area of e-government, whose objective is the development of public administration privacy-aware e-services.


2021 ◽  
Vol 17 (12) ◽  
pp. 155014772110586
Author(s):  
Chu Ji ◽  
Qi Zhu

Spectrum sensing is the key technology of cognitive radio. In this article, we apply blockchain technology in spectrum sensing process and propose a related algorithm based on reputation. The algorithm builds a system model based on smart contract in blockchain and applies blockchain asymmetric encryption algorithm and digital signature technology in the process of secondary users’ transmitting local judgments to the secondary user base station. The algorithm can resist spectrum sensing data falsification (SSDF) attack launched by malicious users. This article comprehensively considers the channel error rate, detection probability, secondary user base station budget and remaining energy of the secondary users (SUs) and then establishes the SU’s utility function as well as the game model. By solving the Nash equilibrium, the SU determines whether it uploads sensing data. Finally, the SU base station selects registered SUs by calculating and updating their reputation, obtaining the final judgment by voting rule. With simulations, we prove that the algorithm proposed in this article increases the accuracy and security of spectrum sensing and can effectively resist SSDF attack.


Author(s):  
Christos Patsonakis ◽  
Katerina Samari ◽  
Mema Roussopoulos ◽  
Aggelos Kiayias

2021 ◽  
Author(s):  
Jing Liu ◽  
Yixin Liu ◽  
Yingxu Lai ◽  
Rongchen Li ◽  
Siyu Wu ◽  
...  

With the rising popularity of the Internet and the development of big data technology, an increasing number of organizations are opting to cooperate across domains to maximize their benefits. Most organizations use public key infrastructure to ensure security in accessing their data and applications. However, with the continuous development of identity-based encryption (IBE) technology, small- and medium-sized enterprises are increasingly using IBE to deploy internal authentication systems. To solve the problems that arise when crossing heterogeneous authentication domains and to guarantee the security of the certification process, we propose using blockchain technology to establish a reliable cross-domain authentication scheme. Using the distributed and tamper-resistant characteristics of the blockchain, we design a cross-domain authentication model based on blockchain to guarantee the security of the heterogeneous authentication process and present a cross-domain authentication protocol based on blockchain. This model does not change the internal trust structure of each authentication domain and is highly scalable. Furthermore, on the premise of ensuring security, the process of verifying the signature of the root certificate in the traditional cross-domain authentication protocol is improved to verify the hash value of the root certificate, thereby improving the authentication efficiency. The developed prototype exhibits generality and simplicity compared to previous methods.


Author(s):  
П.Б. Хорев ◽  
А.М. Тихомиров

Для обеспечения безопасности информационных систем часто используется инфраструктура открытых ключей. Технология Blockchain представляет собой способ организации хранения информации о различных событиях и характеризуется публичностью и надежностью. При использовании технологии блокчейн информация защищена от модификации или удаления, а также всегда может быть верифицирована. На основе технологий PKI и Blockchain можно создать защищенную образовательную сеть доверия. В статье предлагаются методы и программные средства создания и сопровождения удостоверяющего центра и журнала транзакций для участников образовательной сети доверия. Public key infrastructure (PKI) is often used to ensure the security of information systems. Blockchain technology is a way of storing information about various events and is characterized by publicity and reliability. With blockchain technology, information is protected from modification or deletion and can always be verified. Using PKI and Blockchain technologies, you can create a secure educational trust network. The article proposes methods and software tools to create and maintain a certification authority and transaction log for members of the educational trust network.


Sign in / Sign up

Export Citation Format

Share Document