30,892 research outputs found
Recommended from our members
DT-CP: a double-TTPs based contract-signing protocol with lower computational cost
This paper characterizes a contract signing protocol with high efficiency in Internet of Things. Recent studies show that existing contract-signing protocols can achieve abuse-freeness and resist inference attack, but cannot meet the high-efficiency and convenience requirement of the future Internet of things applications. To solve this problem, we propose a novel contract-signing protocol. Our proposed protocol includes two main parts: 1) we use the partial public key of the sender, instead of the zero-knowledge protocol, to verify the intermediate result; 2) we employ two independent Trusted Third Parties (TTPs) to prevent the honest-but-curious TTP. Our analysis shows that our double TTP protocol can not only result in lower computational cost, but also can achieve abuse-freeness with trapdoor commitment scheme. In a word, our proposed scheme performs better than the state of the art in terms of four metrics: encryption time, number of exponentiations, data to be exchanged and exchange steps in one round contract-signing
Fair and optimistic quantum contract signing
We present a fair and optimistic quantum contract signing protocol between
two clients that requires no communication with the third trusted party during
the exchange phase. We discuss its fairness and show that it is possible to
design such a protocol for which the probability of a dishonest client to cheat
becomes negligible, and scales as N^{-1/2}, where N is the number of messages
exchanged between the clients. Our protocol is not based on the exchange of
signed messages: its fairness is based on the laws of quantum mechanics. Thus,
it is abuse-free, and the clients do not have to generate new keys for each
message during the Exchange phase. We discuss a real-life scenario when the
measurement errors and qubit state corruption due to noisy channels occur and
argue that for real, good enough measurement apparatus and transmission
channels, our protocol would still be fair. Our protocol could be implemented
by today's technology, as it requires in essence the same type of apparatus as
the one needed for BB84 cryptographic protocol. Finally, we briefly discuss two
alternative versions of the protocol, one that uses only two states (based on
B92 protocol) and the other that uses entangled pairs, and show that it is
possible to generalize our protocol to an arbitrary number of clients.Comment: 11 pages, 2 figure
BlockPKI: An Automated, Resilient, and Transparent Public-Key Infrastructure
This paper describes BlockPKI, a blockchain-based public-key infrastructure
that enables an automated, resilient, and transparent issuance of digital
certificates. Our goal is to address several shortcomings of the current TLS
infrastructure and its proposed extensions. In particular, we aim at reducing
the power of individual certification authorities and make their actions
publicly visible and accountable, without introducing yet another trusted third
party. To demonstrate the benefits and practicality of our system, we present
evaluation results and describe our prototype implementation.Comment: Workshop on Blockchain and Sharing Economy Application
The Value of User-Visible Internet Cryptography
Cryptographic mechanisms are used in a wide range of applications, including
email clients, web browsers, document and asset management systems, where
typical users are not cryptography experts. A number of empirical studies have
demonstrated that explicit, user-visible cryptographic mechanisms are not
widely used by non-expert users, and as a result arguments have been made that
cryptographic mechanisms need to be better hidden or embedded in end-user
processes and tools. Other mechanisms, such as HTTPS, have cryptography
built-in and only become visible to the user when a dialogue appears due to a
(potential) problem. This paper surveys deployed and potential technologies in
use, examines the social and legal context of broad classes of users, and from
there, assesses the value and issues for those users
- …