scispace - formally typeset
Search or ask a question
Topic

Trusted third party

About: Trusted third party is a research topic. Over the lifetime, 2919 publications have been published within this topic receiving 60935 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: The authors establish a novel and secure communication framework for V2G networks to achieve a balance among security, privacy preservation, efficiency and accountability without relying on any trusted third party.
Abstract: The vehicle-to-grid (V2G) technology enables electric vehicles to deliver electricity into power systems, providing them supplementary capacity. On the other hand, a new set of security threats are brought to smart grid participants by V2G networks. However, security and privacy in V2G networks have so far received little attention, despite a rich literature on the design of conceptual structures or the impact of V2G networks on the current grid. In this study, the authors explore the features of V2G communication networks and identify their security challenges for communication functions. The authors then establish a novel and secure communication framework for V2G networks to achieve a balance among security, privacy preservation, efficiency and accountability without relying on any trusted third party. The feasibility of the framework is demonstrated by experimental results.

17 citations

Proceedings ArticleDOI
01 Aug 2017
TL;DR: A fully distributed user authentication framework with the blockchain technology that stores a user's identity in the blockchain, stores her encrypted personal information in a off-blockchain storage, and attaches a smart contract which grants different permissions to each website/application.
Abstract: User authentication in computer systems has been a cornerstone of computer security for decades. However, the existing user authentication schemes either require human cognitive ability to remember numerous complex id and password, or rely on a trusted third party which could fail due to technical failure or denial-of-service attacks. In this paper, we design a fully distributed user authentication framework with the blockchain technology. In our scheme, a user stores her identity in the blockchain, stores her encrypted personal information in a off-blockchain storage, and attaches a smart contract which grants different permissions to each website/application. When a user logs in a website/application, the service provider employs a challenge-response protocol to verify the identity of the user, and then retrieve the user's personal information from the off-blockchain storage.

17 citations

Proceedings ArticleDOI
30 Jun 2014
TL;DR: A new common-identity attack that breaks existing PPI's is devised and an identity-mixing protocol is proposed against the attack in ε-PPI, the first without any trusted third party and/or trust relationships between providers.
Abstract: In emerging information networks, having a privacy pre-serving index (or PPI) is critically important for locating information of interest for data sharing across autonomous providers while preserving privacy. An understudied problem for PPI techniques is how to provide controllable privacy preservation, given the innate difference of privacy concerns regarding different data owners. In this paper we present a personalized privacy preserving index, coined ∊-PPI, which guarantees quantitative privacy preservation differentiated by personal identities. We devise a new common-identity attack that breaks existing PPI's and propose an identity-mixing protocol against the attack in ∊-PPI. The proposed ∊-PPIconstruction protocol is the first without any trusted third party and/or trust relationships between providers. We have implemented our ∊-PPI construction protocol by using generic MPC techniques (secure multi-party computation) and optimized the performance to a practical level by minimizing the expensive MPC part.

17 citations

Patent
03 Nov 2009
TL;DR: In this article, a method for authenticating a trusted platform based on the Tri-element Peer Authentication (TePA) is presented, which includes the following steps: A) a second attesting system sends the first message to a first attesting systems; B) the first attestation system sends a second message to the second attestation systems after receiving the first signal; C) the second attestations sent by a third party to a Trusted Third Party (TTP).
Abstract: A method for authenticating a trusted platform based on the Tri-element Peer Authentication (TePA). The method includes the following steps: A) a second attesting system sends the first message to a first attesting system; B) the first attesting system sends a second message to the second attesting system after receiving the first message; C) the second attesting system sends a third message to a Trusted Third Party (TTP) after receiving the second message; D) the TTP sends a fourth message to the second attesting system after receiving the third message; E) the second attesting system sends a fifth message to the first attesting system after receiving the fourth message; and F) the first attesting system performs an access control after receiving the fifth message. The method for authenticating a trusted platform based on TePA of the present invention adopts the security architecture of TePA, and improves the safety of an evaluation agreement of the trusted platform, realizes the mutual evaluation of the trusted platform between the attesting systems, and extends the application ranges.

17 citations

Journal ArticleDOI
TL;DR: It is maintained that bitcoin is neither a centralized nor a decentralized payment mechanism, it is, instead, a distributed payment mechanism.
Abstract: We make a distinction between centralized, decentralized, and distributed payment mechanisms. A centralized payment mechanism processes a transaction using a trusted third party. A decentralized payment mechanism processes a transaction between the parties to the transaction. A distributed payment mechanism relies on the network of users to process a transaction on a shared ledger. We maintain that bitcoin is neither a centralized nor a decentralized payment mechanism. It is, instead, a distributed payment mechanism. We then consider decentralized and centralized aspects of the broader bitcoin payment space.

17 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
90% related
Server
79.5K papers, 1.4M citations
85% related
Wireless ad hoc network
49K papers, 1.1M citations
84% related
Mobile computing
51.3K papers, 1M citations
83% related
Network packet
159.7K papers, 2.2M citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202321
202240
2021125
2020201
2019179
2018177