Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3007748.3018280acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicdcnConference Proceedingsconference-collections
research-article

Reinforcing Immutability of Permissioned Blockchains with Keyless Signatures' Infrastructure

Published: 05 January 2017 Publication History

Abstract

With the emergence of Bitcoin, businesses are focusing on leveraging Bitcoin's blockchain technology to non-cryptocurrency based applications to improve efficiency of the operations. These business applications operate in environments where participants have verified identities; these are called permissioned environments. Blockchain is an immutable and append only distributed ledger that can be utilized for record keeping applications. We observe that when blockchain technology is adapted from permissionless environments to permissioned environments the immutability of blockchain becomes questionable as the end-users may not monitor or store a copy of the blockchain. We propose the use of Keyless Signatures' Infrastructure as an additional mechanism to ensure irreversible and irrefutable proof of block confirmations which acts as a global proof thus preserving long term immutability of blockchain in permissioned environments.

References

[1]
Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system. 2008.
[2]
Adam Back. Hashcash- a denial of service counter-measure. 1997. http://www.cypherspace.org/~adam/hashcash/.
[3]
Guy Zyskind, Oz Nathan, and Alex Pentland. Enigma: Decentralized computation platform with guaranteed privacy. CoRR, abs/1506.03471, 2015.
[4]
Ahmed Kosba, Andrew Miller, Elaine Shi, Zikai Wen, and Charalampos Papamanthou. Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. University of Maryland and Cornell University, 2015.
[5]
Ethereum Project. A next-generation smart contract and decentralized application platform, 2014.
[6]
Hyperledger. Hyperledger. 2015. https://www.hyperledger.org/ (Accessed: 17-10-2016).
[7]
Chain. Chain. 2014. https://chain.com/ (Accessed: 17-10-2016).
[8]
Eris Industries. Eris blockchain platform. 2014. https://monax.io/platform/ (Accessed: 21-10-2016).
[9]
Ahto Buldas, Andres Kroonmaa, and Risto Laanoja. Secure IT Systems: 18th Nordic Conference, NordSec 2013, chapter Keyless Signatures' Infrastructure: How to Build Global Distributed Hash-Trees, pages 313--320. 2013.
[10]
Ralph Charles Merkle. Secrecy, authentication, and public key systems. 1979. AAI8001972.

Cited By

View all
  • (2022)Identity Access Management via ECC Stateless Derived Key Based Hierarchical Blockchain for the Industrial Internet of ThingsIEICE Transactions on Information and Systems10.1587/transinf.2022NGP0003E105.D:11(1857-1871)Online publication date: 1-Nov-2022
  • (2022)On the Internet of Things, Blockchain Technology for Supply Chain Management (IoT)Wireless Communications & Mobile Computing10.1155/2022/91857312022Online publication date: 1-Jan-2022
  • (2022)Advanced digital signatures for preserving privacy and trust management in hierarchical heterogeneous IoT: Taxonomy, capabilities, and objectivesInternet of Things10.1016/j.iot.2021.10049218(100492)Online publication date: May-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICDCN '17: Proceedings of the 18th International Conference on Distributed Computing and Networking
January 2017
367 pages
ISBN:9781450348393
DOI:10.1145/3007748
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • IDRBT: IDRBT

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 05 January 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Bitcoin
  2. Blockchain
  3. Hashchain
  4. Keyless Signatures' Infrastructure
  5. Merkle Tree
  6. Permissioned Environments
  7. Permissionless Environments

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICDCN '17

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)17
  • Downloads (Last 6 weeks)1
Reflects downloads up to 15 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2022)Identity Access Management via ECC Stateless Derived Key Based Hierarchical Blockchain for the Industrial Internet of ThingsIEICE Transactions on Information and Systems10.1587/transinf.2022NGP0003E105.D:11(1857-1871)Online publication date: 1-Nov-2022
  • (2022)On the Internet of Things, Blockchain Technology for Supply Chain Management (IoT)Wireless Communications & Mobile Computing10.1155/2022/91857312022Online publication date: 1-Jan-2022
  • (2022)Advanced digital signatures for preserving privacy and trust management in hierarchical heterogeneous IoT: Taxonomy, capabilities, and objectivesInternet of Things10.1016/j.iot.2021.10049218(100492)Online publication date: May-2022
  • (2022)Blockchain-Based Access Control Model for IoT ApplicationsInternet of Things and Its Applications10.1007/978-981-16-7637-6_11(109-119)Online publication date: 18-Feb-2022
  • (2021)Blockchain for Diamond Industry: Opportunities and ChallengesIEEE Internet of Things Journal10.1109/JIOT.2020.30475508:11(8747-8773)Online publication date: 1-Jun-2021
  • (2021)A Systematic Analysis of Applications Of Blockchain in Healthcare2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)10.1109/ISPCC53510.2021.9609339(413-417)Online publication date: 7-Oct-2021
  • (2021)A Framework for Secure Healthcare System Using Blockchain and Smart Contracts2021 Second International Conference on Electronics and Sustainable Communication Systems (ICESC)10.1109/ICESC51422.2021.9532644(922-926)Online publication date: 4-Aug-2021
  • (2021)Blockchain for Cybersecurity: Systematic Literature Review and ClassificationJournal of Computer Information Systems10.1080/08874417.2021.199591462:6(1182-1198)Online publication date: 1-Dec-2021
  • (2021)Security Concerns in IoT Systems and Its Blockchain SolutionsCyber Intelligence and Information Retrieval10.1007/978-981-16-4284-5_42(485-495)Online publication date: 29-Sep-2021
  • (2020)SeFraInternational Journal of E-Health and Medical Communications10.4018/IJEHMC.202001010111:1(1-16)Online publication date: 1-Jan-2020
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media