scispace - formally typeset
Search or ask a question
Topic

Trusted third party

About: Trusted third party is a research topic. Over the lifetime, 2919 publications have been published within this topic receiving 60935 citations.


Papers
More filters
Patent
15 Dec 2008
TL;DR: In this article, the identity-based Peer-to-Peer (P2P) Virtual Private Networks (VPN's) are provided, where first and second principals authenticate to a trusted third party, and the first principal subsequently requests a P2P VPN with the second principal.
Abstract: Techniques for identity-based Peer-to-Peer (P2P) Virtual Private Networks (VPN's) are provided. First and second principals authenticate to a trusted third party. The first principal subsequently requests a P2P VPN with the second principal. The second principal is contacted on behalf of the first principal and permission is acquired. The first and second principals are then sent commands to directly establish a P2P VPN communication session with one another.

22 citations

Journal ArticleDOI
TL;DR: This work built and publicly released a dataset of nearly 9,000 addresses of nodes in the most popular cryptocurrency - Bitcoin, and used supervised machine learning algorithms to find out whether the character of nodes can be revealed based on these features, demonstrating that it is hard to hide the role the node has in a blockchain-based network.
Abstract: The term blockchain has its roots in cryptocurrencies. However, its applications are now more widespread, and in many areas, this technology has become the foundation of the distributed ledger. The blockchain protocol assumes that all the participants of the system are both contributors and safeguards of this ledger, since the lack of a trusted third party requires other security precautions in order to maintain the consistency of transactions. In this work, we investigate whether for the participants of a blockchain-based system that does not require revealing the character explicitly, it can be discovered by other means. In order to verify this, we built and publicly released a dataset of nearly 9,000 addresses of nodes in the most popular cryptocurrency - Bitcoin, and then labelled them. These labels represent the character the nodes have in the network, e.g. miners or exchanges. We then developed a set of features that quantify the behaviour of nodes in the network and used supervised machine learning algorithms to find out whether the character of nodes can be revealed based on these features. Our results demonstrate, due to the F-score reaching over 95% in the best-performing algorithms, that it is hard to hide the role the node has in a blockchain-based network. These results indicate that to build trustworthy blockchain-based systems that fully comply with original blockchain assumptions, specific countermeasures are needed in order to preserve the desired level of anonymity.

22 citations

Proceedings ArticleDOI
TL;DR: This work introduces two new media independent protocol schemes for rightful ownership authentication and combines digital signature schemes and digital watermarking to provide a public verifiable integrity.
Abstract: Digital watermarking has become an accepted technology for enabling multimedia protection schemes. One problem here is the security of these schemes. Without a suitable framework, watermarks can be replaced and manipulated. We discuss different protocols providing security against rightful ownership attacks and other fraud attempts. We compare the characteristics of existing protocols for different media like direct embedding or seed based and required attributes of the watermarking technology like robustness or payload. We introduce two new media independent protocol schemes for rightful ownership authentication. With the first scheme we ensure security of digital watermarks used for ownership protection with a combination of two watermarks: first watermark of the copyright holder and a second watermark from a Trusted Third Party (TTP). It is based on hologram embedding and the watermark consists of e.g. a company logo. As an example we use digital images and specify the properties of the embedded additional security information. We identify components necessary for the security protocol like timestamp, PKI and cryptographic algorithms. The second scheme is used for authentication. It is designed for invertible watermarking applications which require high data integrity. We combine digital signature schemes and digital watermarking to provide a public verifiable integrity. The original data can only be reproduced with a secret key. Both approaches provide solutions for copyright and authentication watermarking and are introduced for image data but can be easily adopted for video and audio data as well.© (2002) COPYRIGHT SPIE--The International Society for Optical Engineering. Downloading of the abstract is permitted for personal use only.

22 citations

Proceedings Article
Sergio Martins1, Yang Yang1
07 Nov 2011
TL;DR: The history and purpose of Bitcoins are discussed along with an overview of its concepts and terminologies, and the Bitcoin network was one of the main focuses - how a distributed and completely public network can maintain the anonymity of its users.
Abstract: • Electronic financial transactions and payment systems have traditionally relied on third party institutions, such as banks or credit card companies, to ensure secure transfers between parties. Users of such systems must trust that third party institutions will be honest and follow through with their claims. Trust-based systems are difficult to establish in the digital realm without a governing body regulating and securing transfers. Systems using this model have many downfalls that make them risky and undesirable for Internet use. With the requirement of all transactions being completely digital, how can we transfer funds securely without a trusted third party? • All types of currencies share many common problems such as stability, control, and inflation. As time passes, the relative value of a currency usually decreases (meaning that prices increase). If this happens too quickly, it can cause major problems if prices increase beyond the means of the populace who uses the currency. Another problem is stability because the currency should not be subject to dramatic exchange rate fluctuations under the influence of a single individual or party. Control over a currency, or lack thereof, is also important. Typical fiat currencies depend on a mint and the promise that the mint will continue its operations. If the mint were to close indefinitely, the currency would likely die out in a relatively short period of time. Therefore, the mint has some level of control over the currency. • Bitcoin is a digital currency introduced in 2009, based on a self-published paper by Satoshi Nakamoto[1]. Bitcoin enables payments that are based on proof, rather than trust, in a manner that is similar to cash. A seller given a cash payment can inspect the currency and, with a good degree of confidence, assert whether the payment is valid or invalid. Bitcoins works using a similar concept that make coins and coin ownership easy to verify. An important difference between this virtual currency and typical fiat currency is that Bitcoin's validity can be verified. • During this workshop we showed attendees the verification process as well as the algorithms and technologies that make verification possible. The audience learned about online money transaction, then analyzed standard techniques and form comparisons between them. The workshop then proceeded to discuss the history and purpose of Bitcoins along with an overview of its concepts and terminologies. • The workshop continues to compare Bitcoins with other transaction techniques discussed and talk about the pros and the cons. We also go though the problems that Bitcoin will be able to solve and what new problems it will introduce. • Attendees will learn the details of Bitcoins and its implementations. From Asymmetric cryptography algorithms to hashing and digital signatures to proof of work, the audience will be walked though all the technologies that make Bitcoin possible. • The workshop will take attendees through actual Bitcoin transactions and the details of the transaction process as it will allow them to see how the Bitcoin system overcome problems such as double spending. The audience was also taught about Bitcoin generation and how Bitcoins are generated out of thin air. For context, we covered how much coins are worth and how people are already profiting from services other than mining. The details of Bitcoin "blocks" and "chains" were demystified in a manner that was detailed but simple to understand. • The Bitcoin network was one of the main focuses - how a distributed and completely public network can maintain the anonymity of its users. It was discussed in detail about how transactions are validated through the network and about the transaction databases that is on the distributed network. The audience learned how the distributed database handles failures, delay, and is able to work effectively with only a subset of the entire database. The audience learned concepts such as merkle trees and how they help the Bitcoin network to maintain the database. We answer questions such as how Bitcoins control the expansion of its own currency when the Bitcoin network may double in size in a short period of time. The many interesting characteristics of the network were unveiled during this engaging demonstration. • Attacks and malicious hosts are constantly a threat to modern day electronic transactional systems and this also applies to Bitcoin. We mapped out the architectural features that make Bitcoin naturally resilient to many common attacks, as well as the features that make it vulnerable. We discussed possible attacks on the Bitcoin network as well as attack mitigation and ways in which end users can protect themselves. • Another interesting issue is anonymity. Bitcoin is regarded as being anonymous by many people, yet Bitcoins can be traced from the original miner all the way to the current owner. A Bitcoin address itself is just a number and cannot identify anyone. However if a person manages to collect enough information about the owner of that address (perhaps through forums) then the owner can be exposed. • To conclude, in this workshop we explored everything from cryptographic algorithms to the massive peer-to-peer network. We took a security perspective for an in-depth exploration of Bitcoin attacks and attack mitigation. We ended our workshop with a look at how Bitcoin might change the e-commerce landscape, followed by an open discussion.

22 citations

Patent
15 Mar 2017
TL;DR: In this article, a fair contract signing method based on a block chain is proposed, which does not need a trusted third party and does not require any expansion on the block chain system.
Abstract: The invention relates to a fair contract signing method based on a block chain. The fair contract signing method based on a block chain relates to two user entities Alice and Bob, and a block chain system. The fair contract signing method based on a block chain includes the steps: 1) Alice and Bob respectively generate the respective valid contract admitted clauses PAA and PAB; 2) Alice and Bob exchange the respective valid contract admitted clauses PAA and PAB, the respective signature for the valid contract admitted clauses, and the respective block height BHA and BHB read from the block chain system; and 3) Alice and Bob exchange the respective generated randomized number and digital signature, and verifies whether a valid contract is generated according to the block chain system and the valid contract admitted clauses of the opposite party, and if not valid, the steps from the step 2 need to be executed again, or the steps are completed. As the fair contract signing method based on a block chain does not need a trusted third party and does not need perform any expansion on the block chain system, thus being able to fairly complete contract signing for both parties, and solves the problem that the prior art needs a trusted third party for contract signing or cannot satisfy the fairness requirement or needs modifying the block chain system, in the background technology.

22 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
90% related
Server
79.5K papers, 1.4M citations
85% related
Wireless ad hoc network
49K papers, 1.1M citations
84% related
Mobile computing
51.3K papers, 1M citations
83% related
Network packet
159.7K papers, 2.2M citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202321
202240
2021125
2020201
2019179
2018177