Verification of the Incremental Merkle Tree Algorithm with Dafny [PDF]
The Deposit Smart Contract (DSC) is an instrumental component of the Ethereum 2.0 Phase 0 infrastructure. We have developed the first machine-checkable version of the incremental Merkle tree algorithm used in the DSC.
F. Cassez
semanticscholar +3 more sources
Polar Coded Merkle Tree: Improved Detection of Data Availability Attacks in Blockchain Systems [PDF]
Light nodes in blockchain systems are known to be vulnerable to data availability (DA) attacks where they accept an invalid block with unavailable portions. Previous works have used LDPC and 2-D Reed Solomon (2D-RS) codes with Merkle Trees to mitigate DA
Debarnab Mitra, Lev Tauz, L. Dolecek
semanticscholar +3 more sources
Cloud computing has revolutionized the IT industry by offering huge storage for data outsourcing and also for computation. Various security issues concerned with security and privacy of data arise in the context of data outsourcing. The framework enables
Devi Thiyagarajan, R. Ganesan
doaj +2 more sources
IMPROVING SMART GRID SECURITY USING MERKLE TREES [PDF]
—Presently nations worldwide are starting to convert their aging electrical power infrastructures into modern, dynamic power grids. Smart Grid offers much in the way of efficiencies and robustness to the electrical power grid, however its heavy reliance ...
Muñoz, Melesio Calderón
core +4 more sources
An Image Authentication Scheme Using Merkle Tree Mechanisms
Research on digital image processing has become quite popular and rapid in recent years, and scholars have proposed various image verification mechanisms. Similarly , blockchain technology has also become very popular in recent years. This paper proposes
Yi-Cheng Chen +2 more
doaj +2 more sources
Evaluating the Security of Merkle Trees: An Analysis of Data Falsification Probabilities [PDF]
Addressing the critical challenge of ensuring data integrity in decentralized systems, this paper delves into the underexplored area of data falsification probabilities within Merkle Trees, which are pivotal in blockchain and Internet of Things (IoT ...
Oleksandr Kuznetsov +5 more
doaj +2 more sources
Improving Security and Reliability in Merkle Tree-Based Online Data Authentication with Leakage Resilience [PDF]
With the successful proliferation of data outsourcing services, security and privacy issues have drawn significant attention. Data authentication in particular plays an essential role in the storage of outsourced digital content and keeping it safe from ...
Dongyoung Koo +3 more
doaj +2 more sources
Ephemeral Keys Authenticated with Merkle Trees and Their Use in IoT Applications [PDF]
Public key algorithms based on quasi-cyclic binary moderate-density parity-check codes (QC-MDPCs) and QC low-density parity-check codes (QC-LDPCs) codes for key encapsulation and encryption submitted to the NIST post-quantum competition (Bit Flipping Key
Pavol Zajac
doaj +2 more sources
Blockchain Merkle-Tree Ethereum Approach in Enterprise Multitenant Cloud燛nvironment [PDF]
Pooja Dhiman +5 more
semanticscholar +2 more sources
HMT: A Hardware-Centric Hybrid Bonsai Merkle Tree Algorithm for High-Performance Authentication [PDF]
Merkle tree is a widely used tree structure for authentication of data/metadata in a secure system. Even though recent state-of-the art systems use MAC based authentication to protect the actual data, they still use smaller-sized MT, namely Bonsai Merkle
Rakin Muhammad Shadab +4 more
semanticscholar +1 more source

