7 research outputs found

    DATA ENCRYPTION ALGORITHM AES BY USING BLOCKCHAIN TECHNOLOGY: A REVIEW

    Get PDF
    Blockchain is used as encryption algorithm in cryptocurrency, but less researches are found to study blockchain for data encryption. Data encryption is needed to protect the data from data theft. We know about data encryption, there are RSA, LEAP, AES, and other algorithms. This research proposed a review in AES algorithm for data encryption within blockchain technology. The research process is followed by determining library, then creating relevant questions and criteria. For good opportunity in the future, this paper generated suggestions and opportunities so that better research can be established in data encryption

    Security properties of light clients on the ethereum blockchain

    Get PDF
    Ethereum is a decentralized blockchain, known as being the second most popular public blockchain after Bitcoin. Since Ethereum is decentralised the canonical state is determined by the Ethereum network participants via a consensus mechanism without a centralized coordinator. The network participants are required to evaluate every transaction starting from the genesis block, which requires a large amount of network, computing, and storage resources. This is impractical for many devices with either limited computing resources or intermittent network connectivity. To overcome this drawback Ethereum defines a light client protocol where the light client fetches the blockchain state from a node operating as a light protocol server. Light clients are unable to maintain blockchain state internally, and as a consequence can only perform partial validation on blocks. Thus they rely on the light server for full block validation and to provide the updated blockchain state. Light clients connect to multiple light servers to mitigate the risk of relying on a single potentially dishonest server. Ethereum light clients are known to suffer from a probabilistic security model, but they are widely assumed to be secure under normal operating conditions. In fact, the implicit security assumptions of light clients have not been formally characterised in the literature. We present and analyse the probabilistic security guarantees under three different adversarial scenarios. The results show that for any adversary that is able to manipulate the network, the security assurances provided by the light protocol are severely impacted, and in some cases entirely lost. These results clearly demonstrate that the assumption of normal operating conditions is insufficient to justify the security assumptions of light clients. Our work also provides insight to the security of light clients under different security parameters, allowing light client implementers to more accurately understand the potential security trade-offs

    UMA ANÁLISE DE ALGORITMOS DE CONSENSO PARA BLOCKCHAIN VISANDO À IMPLEMENTAÇÃO DE SISTEMAS DE INFORMAÇÃO DISTRIBUÍDOS TRANSPARENTES

    Get PDF
    Transparency in distributed-database information systems is only of real value when integration, sharing, consistency and integrity requirements are all firstly guaranteed. By its turn, the Blockchain technology is considered to be the most promising implementation solution to meet these requirements simultaneously. Within this context, this paper analyzes three important consensus algorithms for the Blockchain technology. This analysis includes a theoretical study and a comparative evaluation as well. The results allow us to better understand the most positive points and vulnerabilities of each analyzed algorithm. Finally, general conclusions and future work conclude this article. A transparência em sistemas de informação com bases de dados distribuídas somente tem real valor se antes estiverem garantidos os requisitos de integração, compartilhamento, consistência e integridade. Por sua vez, a tecnologia Blockchain é considerada a mais promissora solução de implementação para atender a esses requisitos conjuntamente. Neste contexto, este artigo analisa três importantes algoritmos de consenso para a tecnologia Blockchain. Esta análise contempla um estudo teórico e uma avaliação comparativa. Os resultados advindos permitem melhor compreender os pontos mais positivos e as vulnerabilidades de cada algoritmo analisado. Por fim, conclusões gerais e trabalhos futuros encerram este artigo

    UMA ANÁLISE DE ALGORITMOS DE CONSENSO PARA BLOCKCHAIN VISANDO À IMPLEMENTAÇÃO DE SISTEMAS DE INFORMAÇÃO DISTRIBUÍDOS TRANSPARENTES

    Get PDF
    Transparency in distributed-database information systems is only of real value when integration, sharing, consistency and integrity requirements are all firstly guaranteed. By its turn, the Blockchain technology is considered to be the most promising implementation solution to meet these requirements simultaneously. Within this context, this paper analyzes three important consensus algorithms for the Blockchain technology. This analysis includes a theoretical study and a comparative evaluation as well. The results allow us to better understand the most positive points and vulnerabilities of each analyzed algorithm. Finally, general conclusions and future work conclude this article. A transparência em sistemas de informação com bases de dados distribuídas somente tem real valor se antes estiverem garantidos os requisitos de integração, compartilhamento, consistência e integridade. Por sua vez, a tecnologia Blockchain é considerada a mais promissora solução de implementação para atender a esses requisitos conjuntamente. Neste contexto, este artigo analisa três importantes algoritmos de consenso para a tecnologia Blockchain. Esta análise contempla um estudo teórico e uma avaliação comparativa. Os resultados advindos permitem melhor compreender os pontos mais positivos e as vulnerabilidades de cada algoritmo analisado. Por fim, conclusões gerais e trabalhos futuros encerram este artigo

    Actas del XXIV Workshop de Investigadores en Ciencias de la Computación: WICC 2022

    Get PDF
    Compilación de las ponencias presentadas en el XXIV Workshop de Investigadores en Ciencias de la Computación (WICC), llevado a cabo en Mendoza en abril de 2022.Red de Universidades con Carreras en Informátic

    Securing light clients in blockchain with DLCP

    No full text

    XXIII Edición del Workshop de Investigadores en Ciencias de la Computación : Libro de actas

    Get PDF
    Compilación de las ponencias presentadas en el XXIII Workshop de Investigadores en Ciencias de la Computación (WICC), llevado a cabo en Chilecito (La Rioja) en abril de 2021.Red de Universidades con Carreras en Informátic
    corecore