916 research outputs found

    Foundations, Properties, and Security Applications of Puzzles: A Survey

    Full text link
    Cryptographic algorithms have been used not only to create robust ciphertexts but also to generate cryptograms that, contrary to the classic goal of cryptography, are meant to be broken. These cryptograms, generally called puzzles, require the use of a certain amount of resources to be solved, hence introducing a cost that is often regarded as a time delay---though it could involve other metrics as well, such as bandwidth. These powerful features have made puzzles the core of many security protocols, acquiring increasing importance in the IT security landscape. The concept of a puzzle has subsequently been extended to other types of schemes that do not use cryptographic functions, such as CAPTCHAs, which are used to discriminate humans from machines. Overall, puzzles have experienced a renewed interest with the advent of Bitcoin, which uses a CPU-intensive puzzle as proof of work. In this paper, we provide a comprehensive study of the most important puzzle construction schemes available in the literature, categorizing them according to several attributes, such as resource type, verification type, and applications. We have redefined the term puzzle by collecting and integrating the scattered notions used in different works, to cover all the existing applications. Moreover, we provide an overview of the possible applications, identifying key requirements and different design approaches. Finally, we highlight the features and limitations of each approach, providing a useful guide for the future development of new puzzle schemes.Comment: This article has been accepted for publication in ACM Computing Survey

    Practices of Using Blockchain Technology in ICT under the Digitalization of the World Economy

    Get PDF
    Abstract. Pursuing the purpose of effective functioning in today's conditions, the business is forced to transform rapidly, to modernize at all levels. The world is changing, erasing the limits of its certainty. Companies need quality transformations and strategies that are effective in the face of rapid change towards "deep" digitization. Massive corporate management systems increasingly need the flexibility to keep pace with change. And companies with an innovative culture are more in need of creative tasks than implementing detailed regulations. In the post-industrial time of digital economy, issues related to the development of the information sphere, the media and communications, the usage of modern information systems to develop the economy and stabilize social development as a whole, come first. The basic principles of practical application of Blockchain are investigated in the work. The stages of development of Blockchain technology, the stages of development of Blockchain technologies by time, the application of distributed registry technology in Blockchain applications, the principles of construction and operation of Blockchain have been specified. The benefits of using NEM for business are substantiated and the components of Proxima X technology, protocols and service layers, on-line and off-line protocols, decentralized applications are exposed

    Consensus Algorithms of Distributed Ledger Technology -- A Comprehensive Analysis

    Full text link
    The most essential component of every Distributed Ledger Technology (DLT) is the Consensus Algorithm (CA), which enables users to reach a consensus in a decentralized and distributed manner. Numerous CA exist, but their viability for particular applications varies, making their trade-offs a crucial factor to consider when implementing DLT in a specific field. This article provided a comprehensive analysis of the various consensus algorithms used in distributed ledger technologies (DLT) and blockchain networks. We cover an extensive array of thirty consensus algorithms. Eleven attributes including hardware requirements, pre-trust level, tolerance level, and more, were used to generate a series of comparison tables evaluating these consensus algorithms. In addition, we discuss DLT classifications, the categories of certain consensus algorithms, and provide examples of authentication-focused and data-storage-focused DLTs. In addition, we analyze the pros and cons of particular consensus algorithms, such as Nominated Proof of Stake (NPoS), Bonded Proof of Stake (BPoS), and Avalanche. In conclusion, we discuss the applicability of these consensus algorithms to various Cyber Physical System (CPS) use cases, including supply chain management, intelligent transportation systems, and smart healthcare.Comment: 50 pages, 20 figure

    Blockchain Technology Facing Socioeconomic Challenges. Promise versus Probability

    Get PDF
    This paper has the main purpose to make a critical and balanced analysis about the potential of blockchain technology to face some of the great current socioeconomic challenges, being focus on impact assessment point of view, analyzing the disruptive potential of blockchain to provide solutions at level of different challenges as example, climate change, migrant movements, gender equality, financial inclusion or the cost opportunity of the management of data science
    • …
    corecore