Approaching decentralized non-repudiation
نویسندگان
چکیده
Securing data exchanges is a major preoccupation, and several techniques have been developed to reach that aim. The predominant model for such exchange is that which relies on trusted third-parties. Meanwhile, emerging technologies such as IoT are set to broadcast growing amounts of sensitive data, thereby making centralized architectures problematic for privacy and performance reasons and making decentralized networks ever more relevant. However, these third-parties play an important role in securing brokered communications and are essential in providing Authentication and Non-Repudiation according to current models, and cannot be used in peer-to-peer networks. Hence there is need for a simple model applicable in fully decentralized networks to provide Non-Repudiation. This document proposes such a model, presents an implementation and discusses its application, particularly in implementing irrefutable trustless transaction mechanisms – similar to blockchain – with limited resources.
منابع مشابه
TLS-N: Non-repudiation over TLS Enabling Ubiquitous Content Signing
An internet user wanting to share observed content is typically restricted to primitive techniques such as screenshots, web caches or share button-like solutions. These acclaimed proofs, however, are either trivial to falsify or require trust in centralized entities (e.g., search engine caches). This motivates the need for a seamless and standardized internet-wide non-repudiation mechanism, all...
متن کاملTLS-N: Non-repudiation over TLS Enabling - Ubiquitous Content Signing for Disintermediation
An internet user wanting to share observed content is typically restricted to primitive techniques such as screenshots, web caches or share button-like solutions. These acclaimed proofs, however, are either trivial to falsify or require trust in centralized entities (e.g., search engine caches). This motivates the need for a seamless and standardized internet-wide non-repudiation mechanism, all...
متن کاملAn efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks
The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...
متن کاملA decentralized public key infrastructure for customer-to-customer e-commerce
The success story of eBay has shown the demand for customer-to-customer (C2C) electronic commerce. eBay is a centralized infrastructure with all its scalability problems (network bandwidth, server load, availability, etc.). In this paper we argue that C2C e-commerce is an application domain that maps naturally onto the emerging field of P2P systems simply by its underlying interaction model of ...
متن کاملAn E-voting Protocol Based on Blockchain
Because of the properties such as transparency, decentralization, irreversibility, nonrepudiation, etc., blockchain is not only a fundamental technology of great interest in its own right, but also has large potential when integrated into many other areas. In this paper, based on the blockchain technology, we propose a decentralized e-voting protocol, without the existence of a trusted third pa...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- EAI Endorsed Trans. Ubiquitous Environments
دوره 4 شماره
صفحات -
تاریخ انتشار 2018