Results 1 to 10 of about 1,334,459 (231)

A fair non-collateral consensus protocol based on Merkle tree for hierarchical IoT blockchain [PDF]

open access: goldScientific Reports
In recent years, there has been a growing interest among researchers in Internet of Things Blockchain (IoTB). A critical aspect of IoTB is its consensus protocol, which faces challenges such as limited bandwidth, energy constraints, and storage space ...
Seyedeh Somayeh Fateminasab   +2 more
doaj   +4 more sources

An Efficient Two-Factor Authentication Scheme Based on the Merkle Tree [PDF]

open access: goldSensors, 2020
The Time-based One-Time Password (TOTP) algorithm is commonly used for two-factor authentication. In this algorithm, a shared secret is used to derive a One-Time Password (OTP). However, in TOTP, the client and the server need to agree on a shared secret
Xinming Yin   +5 more
doaj   +4 more sources

Efficient and Universal Merkle Tree Inclusion Proofs via OR Aggregation [PDF]

open access: goldCryptography
Zero-knowledge proofs have emerged as a powerful tool for enhancing privacy and security in blockchain applications. However, the efficiency and scalability of proof systems remain a significant challenge, particularly in the context of Merkle tree ...
Oleksandr Kuznetsov   +5 more
doaj   +4 more sources

Data Integrity Audit Scheme Based on Quad Merkle Tree and Blockchain

open access: yesIEEE Access, 2023
Cloud storage is an essential method for data storage. Verifying the integrity of data in the cloud is critical for the client. Traditional cloud storage approaches rely on third-party auditors (TPAs) to accomplish auditing tasks.
Zhenpeng Liu   +4 more
doaj   +2 more sources

Polar Coded Merkle Tree: Mitigating Data Availability Attacks in Blockchain Systems Using Informed Polar Code Design [PDF]

open access: greenarXiv.org, 2023
Data availability (DA) attack is a well-known problem in certain blockchains where users accept an invalid block with unavailable portions. Previous works have used LDPC and 2-D Reed Solomon (2D-RS) codes with Merkle trees to mitigate DA attacks.
Debarnab Mitra, Lev Tauz, L. Dolecek
semanticscholar   +3 more sources

Algorithm for Key Transparency with Transparent Logs [version 2; peer review: 2 approved, 1 approved with reservations, 1 not approved] [PDF]

open access: yesOpen Research Europe
Background Cryptography plays a crucial role in securing digital communications and data storage. This study evaluates the Transparent Key Management Algorithm utilizing Merkle trees, focusing on its performance and security effectiveness in ...
Shasivar Rexhepi   +4 more
doaj   +2 more sources

A novel lightweight medical blockchain data query scheme [PDF]

open access: yesScientific Reports
To address the limitations of lightweight medical blockchains in terms of data query efficiency and nonexistence proofs, we propose a novel lightweight medical blockchain data query scheme. First, the XGBoost algorithm is employed to predict medical data
Yunzhen Zhu   +5 more
doaj   +2 more sources

An improved data integrity validation model for cloud storage [PDF]

open access: yesMATEC Web of Conferences, 2021
Data integrity validation is considered to be an important tool to solve the problem that cloud subscribers cannot accurately know whether there are non-subjective changes in the data they upload to cloud servers.
Qin Zhijian, Huo Lin, Zhang Shicong
doaj   +1 more source

Lightweight selective disclosure for verifiable documents on blockchain

open access: yesICT Express, 2021
To achieve lightweight selective disclosure for protecting privacy of document holders, we propose an XML format for documents that can hide arbitrary elements using a cryptographic hash function and salts, which allows to be partially digitally signed ...
Kenji Saito, Satoki Watanabe
doaj   +1 more source

HMT: A Hardware-centric Hybrid Bonsai Merkle Tree Algorithm for High-performance Authentication

open access: yesACM Transactions on Embedded Computing Systems, 2023
The Bonsai Merkle tree (BMT) is a widely used tree structure for authentication of metadata such as encryption counters in a secure computing system. Common BMT algorithms were designed for traditional Von Neumann architectures with a software-centric ...
Rakin Muhammad Shadab   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy