Public key Tracing Framework using Blockchain
نویسندگان
چکیده
Context In recent years, instant messaging has become a popular means of communication among users. This has led to an increased amount of data exchange over the network. The exchanged data is usually privacy-sensitive, which makes data protection crucial in such systems. The market leaders (such as Whatsapp and Telegram) aim at mitigating the risk by utilizing end-to-end asymmetric encryption, where all the exchanged data is encrypted with the corresponding public key of users. Despite the utilization of advanced encryption, clients could still be tricked to encrypt data with public keys of attackers instead of their recipients’ keys [5,6]. These attacks, known as Manin-the-Middle (MitM) [4], could lead to the violation of privacy. The weakness lies in the fact that users are incapable of authenticating, or at the very least tracking, their recipients’ public keys over time. Users’ possession of multiple devices (and thus multiple keys) and the possibility of legitimately obtaining new keys (e.g. in case of a device loss) worsen the situation.
منابع مشابه
A Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملPrivacy-awareness in Blockchain-based PKI
Conventional public key infrastructure (PKI) designs are not optimal and contain security flaws; there is much work underway in improving PKI. The properties given by the Bitcoin blockchain and its derivatives are a natural solution to some of the problems with PKI in particular, certificate transparency and elimination of single points of failure. Recently-proposed blockchain PKI designs are b...
متن کاملThreshold Signatures for Blockchain Systems
Blockchain, introduced as the backbone of the Bitcoin cryptocurrency, is an emerging technology. Abstracting the currency logic away opens Blockchain to endless applications from finance to healthcare and Internet of Things. Asymmetric cryptography and more specifically digital signatures are a key component of the blockchain system. In this work, we introduce threshold signatures for the Hyper...
متن کاملA Blockchain Solution to Gun Control
Blockchain technology can be utilized to improve gun control without changing existing laws. Firearm related mortality is at epidemic levels in the United States and not only has a significant impact upon public health, it also creates a large financial burden. Suicide is the most common way guns kill. Through better gun tracking and improved screening of high risk individuals, this technologic...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017