2019
DOI: 10.1007/978-981-15-2777-7_55
|View full text |Cite
|
Sign up to set email alerts
|

BCSolid: A Blockchain-Based Decentralized Data Storage and Authentication Scheme for Solid

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 15 publications
0
4
0
1
Order By: Relevance
“…A blockchain dependent scheme for decentralized storage and authentication was projected in [29] for the BC solid at which the user's data was independent of the varied web application and thus switches the service of data storage can be independent of multiple web applications more easily without any trusted third party relying. At the same time, this scheme in turn guarantees the ownership of data with privacy of user through the blockchain miner leveraging for performing authentication using certificateless cryptography.…”
Section: Related Workmentioning
confidence: 99%
“…A blockchain dependent scheme for decentralized storage and authentication was projected in [29] for the BC solid at which the user's data was independent of the varied web application and thus switches the service of data storage can be independent of multiple web applications more easily without any trusted third party relying. At the same time, this scheme in turn guarantees the ownership of data with privacy of user through the blockchain miner leveraging for performing authentication using certificateless cryptography.…”
Section: Related Workmentioning
confidence: 99%
“…The proposed system uses a 256 bit ECC key. To break 256 bit ECC, 10 28 MIPS years are required [42], and the current desktop computer can provide 2,356,230 MIPS [43]. Thus ECC 256 would take 4:24 Â 10 21 (10 28 Ä 2; 356; 230) years to break.…”
Section: Privacy Analysismentioning
confidence: 99%
“…Extending the previous conference version [14] that has already reported our preliminary works, we make advances and new contributions in this journal version, including: 1) adjust our centers around the ''trust access authentication'' to conduct more in-depth work; 2) a better representative system model is proposed, which is closer to a real Solid application scenario; 3) a new digital signature scheme is applied in blockchain systems; 4) two signature reconstruction algorithms are considered, thereby making our solutions available to many more potential applications in Solid; and 5) based on the theory and assessment in our previous version, this work implements the system designs such as developing and deploying smart contracts, integrating signature schemes in the transaction validation of permissioned blockchains, and implementing our solutions to evaluate them with benchmarks. Our main contributions are listed as follows:…”
Section: Introductionmentioning
confidence: 97%