A fair non-collateral consensus protocol based on Merkle tree for hierarchical IoT blockchain [PDF]
In recent years, there has been a growing interest among researchers in Internet of Things Blockchain (IoTB). A critical aspect of IoTB is its consensus protocol, which faces challenges such as limited bandwidth, energy constraints, and storage space ...
Seyedeh Somayeh Fateminasab +2 more
doaj +4 more sources
An Efficient Two-Factor Authentication Scheme Based on the Merkle Tree [PDF]
The Time-based One-Time Password (TOTP) algorithm is commonly used for two-factor authentication. In this algorithm, a shared secret is used to derive a One-Time Password (OTP). However, in TOTP, the client and the server need to agree on a shared secret
Xinming Yin +5 more
doaj +4 more sources
Efficient and Universal Merkle Tree Inclusion Proofs via OR Aggregation [PDF]
Zero-knowledge proofs have emerged as a powerful tool for enhancing privacy and security in blockchain applications. However, the efficiency and scalability of proof systems remain a significant challenge, particularly in the context of Merkle tree ...
Oleksandr Kuznetsov +5 more
doaj +4 more sources
Data Integrity Audit Scheme Based on Quad Merkle Tree and Blockchain
Cloud storage is an essential method for data storage. Verifying the integrity of data in the cloud is critical for the client. Traditional cloud storage approaches rely on third-party auditors (TPAs) to accomplish auditing tasks.
Zhenpeng Liu +4 more
doaj +2 more sources
Polar Coded Merkle Tree: Mitigating Data Availability Attacks in Blockchain Systems Using Informed Polar Code Design [PDF]
Data availability (DA) attack is a well-known problem in certain blockchains where users accept an invalid block with unavailable portions. Previous works have used LDPC and 2-D Reed Solomon (2D-RS) codes with Merkle trees to mitigate DA attacks.
Debarnab Mitra, Lev Tauz, L. Dolecek
semanticscholar +3 more sources
Algorithm for Key Transparency with Transparent Logs [version 2; peer review: 2 approved, 1 approved with reservations, 1 not approved] [PDF]
Background Cryptography plays a crucial role in securing digital communications and data storage. This study evaluates the Transparent Key Management Algorithm utilizing Merkle trees, focusing on its performance and security effectiveness in ...
Shasivar Rexhepi +4 more
doaj +2 more sources
A novel lightweight medical blockchain data query scheme [PDF]
To address the limitations of lightweight medical blockchains in terms of data query efficiency and nonexistence proofs, we propose a novel lightweight medical blockchain data query scheme. First, the XGBoost algorithm is employed to predict medical data
Yunzhen Zhu +5 more
doaj +2 more sources
An improved data integrity validation model for cloud storage [PDF]
Data integrity validation is considered to be an important tool to solve the problem that cloud subscribers cannot accurately know whether there are non-subjective changes in the data they upload to cloud servers.
Qin Zhijian, Huo Lin, Zhang Shicong
doaj +1 more source
Lightweight selective disclosure for verifiable documents on blockchain
To achieve lightweight selective disclosure for protecting privacy of document holders, we propose an XML format for documents that can hide arbitrary elements using a cryptographic hash function and salts, which allows to be partially digitally signed ...
Kenji Saito, Satoki Watanabe
doaj +1 more source
HMT: A Hardware-centric Hybrid Bonsai Merkle Tree Algorithm for High-performance Authentication
The Bonsai Merkle tree (BMT) is a widely used tree structure for authentication of metadata such as encryption counters in a secure computing system. Common BMT algorithms were designed for traditional Von Neumann architectures with a software-centric ...
Rakin Muhammad Shadab +4 more
semanticscholar +1 more source

