Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security 2020
DOI: 10.1145/3372297.3417239
|View full text |Cite
|
Sign up to set email alerts
|

DECO: Liberating Web Data Using Decentralized Oracles for TLS

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
35
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 66 publications
(35 citation statements)
references
References 26 publications
0
35
0
Order By: Relevance
“…The straightforward approach is to help them enable FIM or SSI. Either as an interim solution or if services do not want to cooperate, CanDID [154] based on DECO [155] may be another way. CanDID by Maram et al empowers the end user by issuing credentials from existing, unmodified web service providers.…”
Section: Technical Factorsmentioning
confidence: 99%
“…The straightforward approach is to help them enable FIM or SSI. Either as an interim solution or if services do not want to cooperate, CanDID [154] based on DECO [155] may be another way. CanDID by Maram et al empowers the end user by issuing credentials from existing, unmodified web service providers.…”
Section: Technical Factorsmentioning
confidence: 99%
“…Oracle with TLS There are studies that attempt to vote in a decentralized environment to implement Oracle, but it does not support the authentication process for users to bring their own data. On the other hand, Town Crier [11], TLS-N [13], and Deco [12] support data authentication by presenting a protocol for connecting TLS to the blockchain. In particular, in the case of Deco, in TLS 1.3 version, the protocol was configured so that the attestor can verify to the oracle (verifier) through a third-party handshake method without modifying the server for authentication to external sources.…”
Section: Related Workmentioning
confidence: 99%
“…TLS based schemes Research has been conducted to construct a protocol based on Transport Layers Security (TLS) [10] to provide cryptographic authentication of external data. There are methods of providing data based on hardware safety [11] and privacy preserving oracle to verify data with zero-knowledge proof [12]. An approach such as those in [11,12] requires a separate infrastructure that oracle can trust or participate as a verifier of data.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…This can be achieved via oracles, which are themselves smart contracts responsible for bringing external information into the system. Using an authenticated data feed [22][23][24], websites that provide real-time information can feed it into the platform in a way that ensures authenticity. Other solutions include those employed in the Augur 1 and Gnosis 2 prediction markets, which maintain that if enough users say the same thing, then what they say becomes the truth.…”
Section: Introductionmentioning
confidence: 99%