scholarly journals Management of digital documents with encrypted signature, through the use of centralized PKI, and distributed using blockchain for a secure exchange

Author(s):  
Anastacio Antolino-Hernández ◽  
Heberto Ferreira-Medina ◽  
Cristhian Torres-Millarez ◽  
Juan Carlos Olivares-Rojas

The project explores the use of digital documents as a response to the problems presented by physical documents, since they are at risk of partial or total loss.The solution is the digitalization that plays a very important role in society and the contemporary world. This helps sustainability and the preservation of natural resources.The security of the archives is a necessity that requires as solution to use the technology of public key infrastructure (PKI) to generate a digital document, besides registering the public and private keys of the personnel that has the legal power to sign them. These documents are stored on an official server and distributed among the registered hosts of the network. This certificatewill help to detect changes in an unauthorized way, when comparing the document with the original. In this phase of distributed verification, the Blockchain technology will be used.Then the proposal is to build a tool to generate digital documents, in addition to managing public keys, transaction logs and records. The use of Blockchain will allow to establish and configure a Peer to Peer (P2P) network for a secure exchange.

Author(s):  
Wan Abdul Fattah Wan Ismail ◽  
Ahmad Syukran Baharuddin ◽  
Lukman Abdul Mutalib ◽  
Mohamad Aniq Aiman Alias

Digital document is a relatively new form of evidence, particularly for use in the Malaysian Syariah courts. This scenario contrasts with civil courts, which started using digital documents in court proceedings as early as the 1950s. The use of the digital document as evidence is intended to strengthen other methods of proof further. However, the Syariah courts are still less exposed to a new proofing method because there are no specific provisions according to Islamic law to allow it. Not only that, but Syariah law practitioners are also rarely exposed to cases related to the use of digital documents. Therefore, this qualitative study will analyse the admissibility of the digital document as evidence under Islamic law through a systematic analysis. This study uses the PRISMA methodology with the range of data stored on the web at www.scopus.com and http://myjurnal.my, which brings together thousands of scientific writings worldwide. The final screening results found a total of 21 articles that discussed the practice of digital documents as evidence under Islamic law. Furthermore, from the final filter, the researchers found several works of literature that previously discussed the usage of digital documents as evidence in a trial proceeding, which indirectly shows that the Syariah court has begun to accept this type of evidence. It is expected that the results of this study will assist legal practitioners in the Syariah court and become a reference point for researchers, academics and the public in Malaysia.


2019 ◽  
Vol 53 (1-2) ◽  
pp. 67-84 ◽  
Author(s):  
Ronghai Gao ◽  
Jiwen Zeng ◽  
Lunzhi Deng

Threshold decryption allows only quorum cooperate users to decrypt ciphertext encrypted under a public key. However, such threshold decryption scheme cannot be applied well in this situation where all users have their public and private key pairs, but do not share any private keys corresponding to the public keys, such as mobile network featured with dynamic character. The direct way to achieve threshold decryption in this case is to divide the message into several pieces and then encrypt these pieces with the public keys of different users. However, this is very inefficient. Multireceiver threshold decryption scheme that could be applied efficiently in the above situation. Recently, some certificateless (ID-based) multireceiver threshold decryption (signcryption) schemes are introduced. But the bilinear pairings are used in most of the existing schemes. In this paper, we propose an efficient certificateless threshold decryption scheme using elliptic curve cryptography (ECC) without bilinear pairing. Performance analysis shows that the proposed scheme has lower computation cost than existing some threshold decryption schemes in both encryption and decryption process. Security analysis shows that our scheme is IND-CCA secure, and no one outside of selected receivers can disclose receivers identities, against the adversaries defined in CL-PKC system under the random oracle model.


Author(s):  
Yunus Topsakal

The public and private sectors will undergo a significant transformation with the use of blockchain technology, and this potential of blockchain technology will be influential in all areas of life. In addition, blockchain technology can help ease the integration of the Internet of Things, augmented reality, and artificial intelligence applications. The question of how such a technology that is in the process of development will be applied in areas such as taxation, notary operations, and banking, arises simultaneously. Studies related to blockchain technology have mainly been carried out in the fields of finance, logistics, banking, and education. However, there is a paucity of studies on blockchain technology in the tourism industry which has an important role in the global economy. Therefore, the potential of using blockchain technology in the tourism industry is evaluated in this chapter. For this purpose, the features, advantages, and disadvantages of blockchain technology are explained. The potential uses of blockchain technology in the tourism industry are then discussed.


2020 ◽  
Vol 35 ◽  
Author(s):  
Peter Robinson

Abstract A Coordination Blockchain is a blockchain that coordinates activities of multiple private blockchains. This paper discusses the pros and cons of using Ethereum MainNet, the public Ethereum blockchain, as a Coordination Blockchain. The requirements Ethereum MainNet needs to fulfil to perform this role are analyzed within the context of Ethereum Private Sidechains, a private blockchain technology which allows many blockchains to be operated in parallel, and allows atomic crosschain transactions to execute across blockchains. We found that Ethereum MainNet is best suited to storing long-term static data that need to be widely available, such as the Ethereum Registration Authority information. However, due to Ethereum MainNet’s probabilistic finality, it is not well suited to information that needs to be available and acted upon immediately, such as the Sidechain Public Keys and Atomic Crosschain Transaction state information that need to be accessible prior to the first atomic crosschain transaction being issued on a sidechain. Although this paper examined the use of Ethereum MainNet as a Coordination Blockchain within reference to Ethereum Private Sidechains, the discussions and observations of the typical tasks a Coordination Blockchain may be expected to perform are applicable more widely to any multi-blockchain system.


2018 ◽  
Vol 5 (1) ◽  
pp. 204-207
Author(s):  
D A Pechegin

«Current legislation of the Russian Federation establishes a variety of currency restrictions, which are a set of rules established by the state, designed to protect the national currency to affect the behavior of participants in foreign exchange transactions by imposing prohibitions or additional encumbrances on certain foreign exchange transactions». One of the such rules is the provision of art. 27 Federal Law No. 86-FZ of 10.07.2002 «On the Central Bank of the Russian Federation (the Bank of Russia)», according to which the introduction in the territory of the Russian Federation of other monetary units and the issuance of monetary surrogates are prohibited. Meanwhile, the current legislation does not establish any liability for the issuance of cash surrogates. Moreover, new technologies are increasingly being introduced into our lives and are constantly inf luencing the legal environment in which we are currently surrounded. Much attention today is focused on the topic of cryptocurrency and the use of blockchain technology in the public and private sectors. Currently, both professional and non- professional participants are increasingly discussing various aspects of the use of cryptocurrencies in a particular state. The article analyzes urgent issues of the circulation of money substitutes, identifies the prospects of establishing criminal responsibility for the issue and circulation of money substitutes, etc.


Author(s):  
José Carvalho

Em conferência apresentada ao final da década de setenta, o filósofo C. Leffort vinculou a difusão dos discursos pedagógicos “modernizantes” ao esvanecimento do ideal ético-politico da educação. Este artigo pretende, a partir dos escritos de Arendt, vincular esse esvanecimento a um aspecto característico do mundo contemporâneo: a diluição das fronteiras entre as esferas pública e privada. Esse fenômeno tem acarretado profundo impacto nas concepções sobre o significado da ação educativa e nas propostas de políticas públicas que almejam regular as concepções docentes, os conteúdos ministrados e as práticas avaliativas dos sistemas. O que se procurará demonstrar é que à medida que se passa a conceber o valor e a qualidade da educação preponderantemente a partir de seu alegado impacto econômico na vida privada do indivíduo perde-se, conseqüentemente, seu sentido ético e político. Abstract The decline in the public sense of education In a conference presented in the late seventies, the French philosopher C. Leffort linked the emergence of ‘modern’ pedagogical discourse to the disappearance of ethical and political ideals of education. The present article aims at connecting this disappearance to a typical feature of the contemporary world: the evanescence of the boundaries between the public and private spheres. This phenomenon has had a deep impact on general concepts concerning the meaning of education and on public policies aimed at regulating teachers’ procedures, curricula choices and evaluative practices. What the study intends to demonstrate is that the more one associates the significance of schooling to economical growth and individual success, the less one conceives it as an ethical and political process of building up an image of man. Keywords: public sphere; Arendt; formation and ethical ideals.


Author(s):  
Manuel Mogollon

In public-key encryption, the secrecy of the public key is not required, but the authenticity of the public key is necessary to guarantee its integrity and to avoid spoofing and playback attacks. A user’s public key can be authenticated (signed) by a certificate authority that verifies that a public key belongs to a specific user. In this chapter, digital certificates, which are used to validate public keys, and certificate authorities are discussed. When public-key is used, it is necessary to have a comprehensive system that provides public key encryption and digital signature services to ensure confidentiality, access control, data integrity, authentication, and non-repudiation. That system, public-key infrastructure or PKI, is also discussed in this chapter.


2020 ◽  
Vol 11 (4) ◽  
pp. 52-62
Author(s):  
Yousef Alabbasi

Blockchain (BC) provides an encrypted echo system to the users where they can securely mark their transactional entries in a distributed ledger. The ledger comprises of distributed and shared network of nodes that validate the authenticity of each transaction and keeps its authentic record for perusal. Keeping view of the enormous potential of this technology, numerous public and private entities are embarking the bandwagon of blockchain and integrating this technology for ensuring a transitioning in their digital finance operations. Apart from the financial realm, healthcare, agriculture, and education sectors are also benefiting from the security and reliability of BC. Incorporation of BC in the public sector at increased scale requires a review of existing governance and legislative structures and a recalibration of regulatory regimes. This paper presents a literature review on blockchain technology, its current usage trends, and its governance.


2010 ◽  
Vol 54 (2) ◽  
pp. 55-74
Author(s):  
Małgorzata Bogunia-Borowska

The new media and new technologies release and provoke socio-cultural changes not only in function of the old media but also in human existence. In the centre of the author’s interest is the concept of “self-television”. Although the role of television in contemporary world is still very significant, the evolution and modernization of television structure is essential. On one hand television structure very quickly reacts to very dynamic socio-cultural processes and challenges and on the other adapts to them. The concept of self-television emphasizes two processes which are responsible for the construction of modern television. One of them is meta-television narration and another is related to the autoreference nature of television. Both of them have caused a series of changes in the television structure which adjust to the cognitive structures of the television viewers. In this sense the television which tries to follow socio-cultural changes reproduces and popularizes the social mechanisms and social rules. In the context of the modern role of television in society it brings up also the problem of confusion of the public and private sphere and public and behind the scene actions which is analyzed in the article. Therefore the main purpose of the article is to research these two main processes which are observed in the construction and development of self-television.


Sign in / Sign up

Export Citation Format

Share Document