Results 31 to 40 of about 1,334,459 (231)

Keeping Authorities "Honest or Bust" with Decentralized Witness Cosigning [PDF]

open access: yes, 2016
The secret keys of critical network authorities - such as time, name, certificate, and software update services - represent high-value targets for hackers, criminals, and spy agencies wishing to use these keys secretly to compromise other hosts.
Ford, Bryan   +8 more
core   +3 more sources

A Review on Blockchain Operations in Construction Management

open access: yesJournal of Sustainable Construction Materials and Technologies, 2023
This study investigates the important role that the blockchain plays to manage the information about who did what and when and hence provides a strong base for any legal potential conflicts.
Hasan Volkan Oral, Bassant Sayed
doaj   +1 more source

JaxNet: Scalable Blockchain Network [PDF]

open access: yes, 2020
Today's world is organized based on merit and value. A single global currency that's decentralized is needed for a global economy. Bitcoin is a partial solution to this need, however it suffers from scalability problems which prevent it from being mass ...
Emelyanenko, Taras   +3 more
core   +1 more source

SPHINCS$^+$ post-quantum digital signature scheme with Streebog hash function

open access: yes, 2020
Many commonly used public key cryptosystems will become insecure once a scalable quantum computer is built. New cryptographic schemes that can guarantee protection against attacks with quantum computers, so-called post-quantum algorithms, have emerged in
Anufriev, M. N.   +5 more
core   +1 more source

Non-malleable codes for space-bounded tampering [PDF]

open access: yes, 2017
Non-malleable codes—introduced by Dziembowski, Pietrzak and Wichs at ICS 2010—are key-less coding schemes in which mauling attempts to an encoding of a given message, w.r.t.
A Faonio   +30 more
core   +2 more sources

Distributed Random Process for a Large-Scale Peer-to-Peer Lottery [PDF]

open access: yes, 2017
Most online lotteries today fail to ensure the verifiability of the random process and rely on a trusted third party. This issue has received little attention since the emergence of distributed protocols like Bitcoin that demonstrated the potential of ...
J Zhou   +7 more
core   +4 more sources

Verifiable multi-keyword search scheme based on improved Merkle-Tree authentication method

open access: yesTongxin xuebao, 2020
Aiming at the problem that the result verification method in the searchable encryption scheme was complicated,the search cost was high and the efficiency was low,it was difficult to meet the requirements of efficient verification and security of multi ...
Youliang TIAN, Qin LUO
doaj   +2 more sources

Efficient incremental hash chain with probabilistic filter-based method to update blockchain light nodes

open access: yesНаучно-технический вестник информационных технологий, механики и оптики
In blockchain, ensuring integrity of data when updating distributed ledgers is a challenging and very fundamental process. Most of blockchain networks use Merkle tree to verify the authenticity of data received from other peers on the network.
M. A. Maalla, S. V. Bezzateev
doaj   +1 more source

Authenticating Spatial Queries on Blockchain Systems

open access: yesIEEE Access, 2021
In many blockchain networks, light nodes (e.g. mobile clients) with few computational resources must rely on more powerful full nodes to retrieve transactions from the chain.
Matteo Loporchio   +3 more
doaj   +1 more source

Analysis of the Cryptographic Tools for Blockchain and Bitcoin

open access: yesMathematics, 2020
Blockchain is one of the most interesting emerging technologies nowadays, with applications ranging from cryptocurrencies to smart contracts. This paper presents a review of the cryptographic tools necessary to understand the fundamentals of this ...
Víctor Gayoso Martínez   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy