scispace - formally typeset
Search or ask a question
Topic

Trusted third party

About: Trusted third party is a research topic. Over the lifetime, 2919 publications have been published within this topic receiving 60935 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: The design of the non-public-key group key establishment protocols is unique since the storage of each user is minimal, the verification of master shares is efficient and the group key distribution is centralized.
Abstract: The type of centralized group key establishment protocols is the most commonly used one due to its efficiency in computation and communication. A key generation center (KGC) in this type of protocols acts as a server to register users initially. Since the KGC selects a group key for group communication, all users must trust the KGC. Needing a mutually trusted KGC can cause problem in some applications. For example, users in a social network cannot trust the network server to select a group key for a secure group communication. In this paper, we remove the need of a mutually trusted KGC by assuming that each user only trusts himself. During registration, each user acts as a KGC to register other users and issue sub-shares to other users. From the secret sharing homomorphism, all sub-shares of each user can be combined into a master share. The master share enables a pairwise shared key between any pair of users. A verification of master shares enables all users to verify their master shares are generated consistently without revealing the master shares. In a group communication, the initiator can become the server to select a group key and distribute it to each other user over a pairwise shared channel. Our design is unique since the storage of each user is minimal, the verification of master shares is efficient and the group key distribution is centralized. There are public-key based group key establishment protocols without a trusted third party. However, these protocols can only establish a single group key. Our protocol is a non-public-key solution and can establish multiple group keys which is computationally efficient.

18 citations

Proceedings ArticleDOI
01 Oct 2019
TL;DR: This paper proposes a trust transferring model by using blockchain consensus instead of traditional trusted third party for e-government applications and proves the scheme's feasibility from engineering perspective and has enough scalability to satisfy trust transfer requirements of multiple PKI systems.
Abstract: Public Key Infrastructure (PKI) has been popularized in many scenarios such as e-government applications, enterprises, etc. Due to the construction of PKI system of various regions and departments, there formed a lot of isolated PKI management domains, cross-domain authentication has become a problem that cannot ignored, which also has some traditional solutions such as cross-authentication, trust list, etc. However, some issues still exist, which hinder the popularity of unified trust services. For example, lack of unified cross domain standard, the update period of Certificate Revocation List (CRL) is too long, which affects the security of cross-domain authentication. In this paper, we proposed a trust transferring model by using blockchain consensus instead of traditional trusted third party for e-government applications. We exploit how to solve the unified trust service problem of PKI at the national level through consensus and transfer some CA management functions to the blockchain. And we prove the scheme's feasibility from engineering perspective. Besides, the scheme has enough scalability to satisfy trust transfer requirements of multiple PKI systems. Meanwhile, the security and efficiency are also guaranteed compared with traditional solutions.

18 citations

Book ChapterDOI
14 Dec 2018
TL;DR: This paper developed an online auction system based on Ethereum smart contracts that guarantees greater transparency and avoids cheating auctioneers, and analysed its implementation in terms of cost and time efficiency.
Abstract: In this paper, we developed an online auction system based on Ethereum smart contracts. A smart contract is executable code that runs on top of the blockchain to facilitate, execute and enforce an agreement between untrusted parties without the involvement of a trusted third party. A decentralised auction guarantees greater transparency and avoids cheating auctioneers. Since in Ethereum computation is expensive as transactions are executed and verified by all the nodes on Ethereum network, we analysed our implementation in terms of cost and time efficiency, obtaining promising results.

18 citations

Book ChapterDOI
TL;DR: Blockchain is one of the best-emerging technologies for ensuring privacy and security by using cryptographic algorithms and hashing and it will be discussed the basics of blockchain technology, consensus algorithms, comparison of important consensus algorithms and areas of application.
Abstract: In today’s era of big data and machine learning, IoT is playing a very crucial role in nearly all areas like social, economic, political, education, health care. This drastic increase in data creates security, privacy, and trust issues in the era of the Internet. The responsibility of IT is to ensure the privacy and security for huge incoming information and data due to the drastic evolution of the IoT in the coming years. The blockchain has emerged as one of the major technologies that have the potential to transform the way of sharing the huge information and increase trust among. Building trust in a distributed and decentralized environment without the call for a trusted third party is a technological challenge for researchers. Due to the emergence of IoT, the huge and critical information is available over the Internet. The trust over the information is reduced drastically, causing an increase in security and privacy concern day by day. Blockchain is one of the best-emerging technologies for ensuring privacy and security by using cryptographic algorithms and hashing. We will discuss the basics of blockchain technology, consensus algorithms, comparison of important consensus algorithms, and areas of application.

18 citations

Journal ArticleDOI
TL;DR: Wang et al. as mentioned in this paper proposed a federated proxy-free privacy-preserving and federated crowdsourcing system, which interconnects the existing crowdsourcing systems and can perform encrypted task matching across various systems without relying on a trusted third-party authority.
Abstract: With the rapid development and widespread application of crowdsourcing, the limitations of traditional systems are gradually exposed First, traditional systems fail to protect the privacy of task requesters and workers They typically rely on a centralized server to aggregate the task content and workers’ interests, while these data contain sensitive information Second, crowdsourcing resources in each system are isolated The tasks in one system cannot reach potential workers in other systems Thus, there is a great need to build a new privacy-preserving and federated crowdsourcing system However, the existing privacy-preserving solutions rely on a trusted third party to perform key management, which is not applicable in a federated setting To this end, we propose the first proxy-free privacy-preserving and federated crowdsourcing system It interconnects the existing crowdsourcing systems and can perform encrypted task matching across various systems without relying on a trusted third-party authority Our main idea is to achieve federated crowdsourcing by moving secure task matching to the trusted smart contract To get rid of the dependence on the trusted authority, we combine the rewritable deterministic hashing technique with searchable encryption schemes to achieve secure on-chain task-matching authorization Moreover, we utilize the puncturable encryption technique to implement secure authorization revocation We formally analyze the security of our design and implement a prototype on Ethereum Evaluation results demonstrate that our design is secure and efficient for blockchain-based crowdsourcing

18 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
90% related
Server
79.5K papers, 1.4M citations
85% related
Wireless ad hoc network
49K papers, 1.1M citations
84% related
Mobile computing
51.3K papers, 1M citations
83% related
Network packet
159.7K papers, 2.2M citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202321
202240
2021125
2020201
2019179
2018177