scispace - formally typeset
Search or ask a question
Topic

Trusted third party

About: Trusted third party is a research topic. Over the lifetime, 2919 publications have been published within this topic receiving 60935 citations.


Papers
More filters
Proceedings ArticleDOI
14 May 2019
TL;DR: SmartJudge is introduced, an extensible generalization of this trend for smart contract-based two-party protocols that relies on a protocol-independent mediator smart contract that moderates two- party interactions and only consults protocol-specific verifier smart contracts in case of a dispute.
Abstract: Blockchain systems promise to mediate interactions of mutually distrusting parties without a trusted third party. However, protocols with full smart contract-based security are either limited in functionality or complex, with high costs for secured interactions. This observation leads to the development of protocol-specific schemes to avoid costly dispute resolution in case all participants remain honest. In this paper, we introduce SmartJudge, an extensible generalization of this trend for smart contract-based two-party protocols. SmartJudge relies on a protocol-independent mediator smart contract that moderates two-party interactions and only consults protocol-specific verifier smart contracts in case of a dispute. This way, SmartJudge avoids verification costs in absence of disputes and sustains interaction confidentiality among honest parties. We implement verifier smart contracts for cross-blockchain trades and exchanging digital goods and show that SmartJudge can reduce costs by 46–50% and 22% over current state of the art, respectively.

23 citations

Journal ArticleDOI
TL;DR: A novel authentication framework, namely APEA, is developed that integrates a new key management protocol, i.e., an adapted construction of short group signature (SGS) and batch verification, as an effective approach to simultaneously achieve the four goals without involving any trusted third party.
Abstract: The convergence of wireless access networks significantly changes the way we live and work, bringing us closer to the goal of computing anywhere at any time. Security, privacy, accountability, and efficiency issues are of most concern in the deployment of such networks. Despite the need and importance, little research has been conducted on designing accountable and privacy-preserving authentication schemes for wireless access networks, not to mention schemes that can simultaneously and efficiently provide accountability and privacy protection without involving any trusted third party. This motivates us to develop a novel authentication framework, namely APEA , that integrates a new key management protocol, i.e., an adapted construction of short group signature (SGS) and batch verification, as an effective approach to simultaneously achieve the four goals without involving any trusted third party. Experiments using our implementation on laptop PCs demonstrate that APEA is feasible in practice.

23 citations

Journal ArticleDOI
TL;DR: A new mechanism introducing a group-buying server to secure and monitor the transaction and employ the Bloom filter and XOR operation to reduce the size of the transaction table and the computational cost is proposed.

23 citations

Proceedings ArticleDOI
27 May 2003
TL;DR: This work introduces SCENS, a secure content exchange negotiation system suitable for the exchange of private digital data that reside in distributed digital repositories enabling independent entities to interact and conduct multiple forms of negotiation.
Abstract: This paper introduces SCENS, a Secure Content Exchange Negotiation System suitable for the exchange of private digital data that reside in distributed digital repositories. SCENS is an open negotiation system with flexibility, security and scalability. SCENS is currently being designed to support data sharing in scientific research, by providing incentives and goals specific to a research community. However, it can easily be extended to apply to other communities, such as government, commercial and other types of exchanges. It is a trusted third party software infrastructure enabling independent entities to interact and conduct multiple forms of negotiation.

23 citations

Journal ArticleDOI
TL;DR: A quantum protocol for (t,n)-threshold identity authentication based on Greenberger-Horne-Zeilinger states is presented and is more flexible and suitable for practical applications.
Abstract: A quantum protocol for (t,n)-threshold identity authentication based on Greenberger-Horne-Zeilinger states is presented. A trusted third party (TTP) can authenticate the users simultaneously when and only when t or more users among n apply for authentication. Compared with the previous multiparty simultaneous quantum identity authentication (MSQIA) protocols, the proposed scheme is more flexible and suitable for practical applications.

22 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
90% related
Server
79.5K papers, 1.4M citations
85% related
Wireless ad hoc network
49K papers, 1.1M citations
84% related
Mobile computing
51.3K papers, 1M citations
83% related
Network packet
159.7K papers, 2.2M citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202321
202240
2021125
2020201
2019179
2018177