284 research outputs found

    Gossip Codes for Fingerprinting: Construction, Erasure Analysis and Pirate Tracing

    Full text link
    This work presents two new construction techniques for q-ary Gossip codes from tdesigns and Traceability schemes. These Gossip codes achieve the shortest code length specified in terms of code parameters and can withstand erasures in digital fingerprinting applications. This work presents the construction of embedded Gossip codes for extending an existing Gossip code into a bigger code. It discusses the construction of concatenated codes and realisation of erasure model through concatenated codes.Comment: 28 page

    Blockchain applications for a sustainable future

    Get PDF
    openLa tecnologia Blockchain promette di rivoluzionare il controllo e la gestione della catena produttiva, riducendo gli sprechi e l'impronta ecologica dei processi su cui viene applicata. Nonostante ciò, i principali sistemi che attualmente si basano su di essa - come ad esempio Ethereum per gli NFT - richiedono un consumo energetico talmente ampio da non risultare sostenibile nel futuro prossimo. L'obiettivo dell'elaborato è quindi quello di cercare un punto di convergenza tra le due facce della medaglia, fornendo una visione responsabile riguardo applicazioni future, che permetta di conciliare progresso tecnologico e sostenibilità economica e ambientale.The Blockchain technology promises to revolutionize the administration and control of the productive chain, reducing waste and carbon footprint of the processes on which it is applied. Nevertheless, the most relevant systems that are currently based on it - such as Ethereum for the NFT - require a huge energetic consumption, so that is does not seem to be sustainable in the future. The aim of this work is to find a point of contact between the two sides of the coin, presenting a responsible sight on possible future applications, that allows to conciliate technological progress with environmental and economic sustainability

    Contribution to the construction of fingerprinting and watermarking schemes to protect mobile agents and multimedia content

    Get PDF
    The main characteristic of fingerprinting codes is the need of high error-correction capacity due to the fact that they are designed to avoid collusion attacks which will damage many symbols from the codewords. Moreover, the use of fingerprinting schemes depends on the watermarking system that is used to embed the codeword into the content and how it honors the marking assumption. In this sense, even though fingerprinting codes were mainly used to protect multimedia content, using them on software protection systems seems an option to be considered. This thesis, studies how to use codes which have iterative-decoding algorithms, mainly turbo-codes, to solve the fingerprinting problem. Initially, it studies the effectiveness of current approaches based on concatenating tradicioanal fingerprinting schemes with convolutional codes and turbo-codes. It is shown that these kind of constructions ends up generating a high number of false positives. Even though this thesis contains some proposals to improve these schemes, the direct use of turbo-codes without using any concatenation with a fingerprinting code as inner code has also been considered. It is shown that the performance of turbo-codes using the appropiate constituent codes is a valid alternative for environments with hundreds of users and 2 or 3 traitors. As constituent codes, we have chosen low-rate convolutional codes with maximum free distance. As for how to use fingerprinting codes with watermarking schemes, we have studied the option of using watermarking systems based on informed coding and informed embedding. It has been discovered that, due to different encodings available for the same symbol, its applicability to embed fingerprints is very limited. On this sense, some modifications to these systems have been proposed in order to properly adapt them to fingerprinting applications. Moreover the behavior and impact over a video produced as a collusion of 2 users by the YouTube’s s ervice has been s tudied. We have also studied the optimal parameters for viable tracking of users who have used YouTube and conspired to redistribute copies generated by a collusion attack. Finally, we have studied how to implement fingerprinting schemes and software watermarking to fix the problem of malicious hosts on mobile agents platforms. In this regard, four different alternatives have been proposed to protect the agent depending on whether you want only detect the attack or avoid it in real time. Two of these proposals are focused on the protection of intrusion detection systems based on mobile agents. Moreover, each of these solutions has several implications in terms of infrastructure and complexity.Els codis fingerprinting es caracteritzen per proveir una alta capacitat correctora ja que han de fer front a atacs de confabulació que malmetran una part important dels símbols de la paraula codi. D'atra banda, la utilització de codis de fingerprinting en entorns reals està subjecta a que l'esquema de watermarking que gestiona la incrustació sigui respectuosa amb la marking assumption. De la mateixa manera, tot i que el fingerprinting neix de la protecció de contingut multimèdia, utilitzar-lo en la protecció de software comença a ser una aplicació a avaluar. En aquesta tesi s'ha estudiat com aplicar codis amb des codificació iterativa, concretament turbo-codis, al problema del rastreig de traïdors en el context del fingerprinting digital. Inicialment s'ha qüestionat l'eficàcia dels enfocaments actuals en la utilització de codis convolucionals i turbo-codis que plantegen concatenacions amb esquemes habituals de fingerprinting. S'ha demostrat que aquest tipus de concatenacions portaven, de forma implícita, a una elevada probabilitat d'inculpar un usuari innocent. Tot i que s'han proposat algunes millores sobre aquests esquemes , finalment s'ha plantejat l'ús de turbocodis directament, evitant així la concatenació amb altres esquemes de fingerprinting. S'ha demostrat que, si s'utilitzen els codis constituents apropiats, el rendiment del turbo-descodificador és suficient per a ser una alternativa aplicable en entorns amb varis centenars d'usuaris i 2 o 3 confabuladors . Com a codis constituents s'ha optat pels codis convolucionals de baix ràtio amb distància lliure màxima. Pel que fa a com utilitzar els codis de fingerprinting amb esquemes de watermarking, s'ha estudiat l'opció d'utilitzar sistemes de watermarking basats en la codificació i la incrustació informada. S'ha comprovat que, degut a la múltiple codificació del mateix símbol, la seva aplicabilitat per incrustar fingerprints és molt limitada. En aquest sentit s'ha plantejat algunes modificacions d'aquests sistemes per tal d'adaptar-los correctament a aplicacions de fingerprinting. D'altra banda s'ha avaluat el comportament i l'impacte que el servei de YouTube produeix sobre un vídeo amb un fingerprint incrustat. A més , s'ha estudiat els paràmetres òptims per a fer viable el rastreig d'usuaris que han confabulat i han utilitzat YouTube per a redistribuir la copia fruït de la seva confabulació. Finalment, s'ha estudiat com aplicar els esquemes de fingerprinting i watermarking de software per solucionar el problema de l'amfitrió maliciós en agents mòbils . En aquest sentit s'han proposat quatre alternatives diferents per a protegir l'agent en funció de si és vol només detectar l'atac o evitar-lo en temps real. Dues d'aquestes propostes es centren en la protecció de sistemes de detecció d'intrusions basats en agents mòbils. Cadascuna de les solucions té diverses implicacions a nivell d'infrastructura i de complexitat.Postprint (published version

    An Innovative Strategy Based on Secure Element for Cyber–Physical Authentication in Safety-Critical Manufacturing Supply Chain

    Get PDF
    This research has been founded by the European Union’s Horizon 2020 Research and Innovation program under grant agreement No. 871518, a project named, A COmprehensive cyber-intelligence framework for resilient coLLABorative manufacturing Systems, COLLABS [55].The accurate tracking of every production step and related outcome in a supply chain is a stringent requirement in safety-critical sectors such as civil aviation. In such a framework, trusted traceability and accountability can be reliably and securely managed by means of blockchain-based solutions. Unfortunately, blockchain cannot guarantee the provenance and accuracy of the stored information. To overcome such a limitation, this paper proposes a secure solution to strongly rely on the tracking information of the physical assets in the supply chain. The proposed solution exploits Hardware Security Modules (HSMs) to provide required cryptographic primitives through a Near-Field Communication (NFC) connection. In our approach, each transfer of the assets is authenticated, verified, and recorded in the blockchain through the HSM. Transaction entries are signed, thus providing a guarantee of ownership and authenticity. The proposed infrastructure has been subject of an exhaustive security analysis and proved resilient against counterfeiting attempts, stakeholder repudiations, and misleading information.Horizon 2020 Framework Programme 871518 H202

    Sustainable Development Report: Blockchain, the Web3 & the SDGs

    Get PDF
    This is an output paper of the applied research that was conducted between July 2018 - October 2019 funded by the Austrian Development Agency (ADA) and conducted by the Research Institute for Cryptoeconomics at the Vienna University of Economics and Business and RCE Vienna (Regional Centre of Expertise on Education for Sustainable Development).Series: Working Paper Series / Institute for Cryptoeconomics / Interdisciplinary Researc

    Sustainable Development Report: Blockchain, the Web3 & the SDGs

    Get PDF
    This is an output paper of the applied research that was conducted between July 2018 - October 2019 funded by the Austrian Development Agency (ADA) and conducted by the Research Institute for Cryptoeconomics at the Vienna University of Economics and Business and RCE Vienna (Regional Centre of Expertise on Education for Sustainable Development).Series: Working Paper Series / Institute for Cryptoeconomics / Interdisciplinary Researc

    Overview on the Blockchain-Based Supply Chain Systematics and Their Scalability Tools

    Get PDF
    Modern IT technologies shaped the shift in economic models with many advantages on cost, optimization, and time to market. This economic shift has increased the need for transparency and traceability in supply chain platforms to achieve trust among partners. Distributed ledger technology (DLT) is proposed to enable supply chains systems with trust requirements. In this paper, we investigate the existing DLT-based supply chain projects to show their technical part and limitations and extract the tools and techniques used to avoid the DLT scalability issue. We then set the requirements for a typical DLT-based supply chain in this context. The analyses are based on the scalability metrics such as computing, data storage, and transaction fees that fit the typical supply chain system. This paper highlights the effects of Blockchain techniques on scalability and their incorporation in supply chains systems. It also presents other existing solutions that can be applied to the supply chain. The investigation shows the necessity of having such tools in supply chains and developing them to achieve an efficient and scalable system. The paper calls for further scalability enhancements throughout introducing new tools and/or reutilize the current ones. Doi: 10.28991/esj-2021-SP1-04 Full Text: PD

    #Blockchain4EU: Blockchain for Industrial Transformations

    Get PDF
    The project #Blockchain4EU is a forward looking exploration of existing, emerging and potential applications based on Blockchain and other DLTs for industrial / non-financial sectors. It combined Science and Technology Studies with a transdisciplinary policy lab toolbox filled with frameworks from Foresight and Horizon Scanning, Behavioural Insights, or Participatory, Critical and Speculative Design. Amid unfolding and uncertain developments of the Blockchain space, our research signals a number of crucial opportunities and challenges around a technology that could record, secure and transfer any digitised transaction or process, and thus potentially affect large parts of current industrial landscapes. This report offers key insights for its implementation and uptake by industry, businesses and SMEs, together with science for policy strategic recommendations.JRC.I.2-Foresight, Behavioural Insights and Design for Polic
    corecore